🚨 Get Your Free NFT Certificate Mint by Completing the Web3 Exam! START NOW
Learn to gain real rewards

Learn to gain real rewards

Collect Bits, boost your Degree and gain actual rewards!

New
Video Courses
Video Courses
Deprecated
Scale your career with online video courses. Dive into your learning adventure!
Crypto Terms:  Letter K

What is Keccak?

Meaning:
Keccak - can also be referred to as SHA-3 is a cryptographic algorithm.
medium
3 minutes

Let's find out Keccak meaning, definition in crypto, what is Keccak, and all other detailed facts.

Keccak is a cryptographic mechanism that was created by Gilles Van Assche, Guido Bertoni, Joan Daemen, and Michael Peeters. It offers the best and most upgraded security compared to how it was with older SHA-1 and SHA-2 hash functions. However, the algorithm is used for other functions as well.

2007 was approximately the year when the Keccak function started to be created. It took place after NIST's announcement of a public competition and testing procedure for a new cryptographic hash function capable of overcoming the possible weaknesses of the prior SHA-1 and SHA-2.

To put things into perspective, the Secure Hash Algorithm (SHA) is a collection of cryptographic hash functions that were published by the U.S. National Institute of Standards and Technology (NIST). Speaking of the earlier versions, SHA-1, and SHA-2, these are very similar and were created by the US National Security Agency (NSA).

Conceptual attacks on SHA-1 were carried out in 2004 and made public in 2005. NIST announced SHA-2 as the new standard hash function to be used a few years later, in 2011. However, the transition from SHA-1 to SHA-2 was extremely slow, and it wasn't until early 2017 that a considerable number of developers and computer scientists made the switch. 

Soon afterward, in February 2017, Google disclosed an effective SHA-1 collision attack. Since then, SHA-1 is no longer regarded as safe, and its use is banned.

Even though Keccak has the same hash lengths as SHA-2, they are still distinct. This is why Keccak is also considered to be SHA-3.

Because Keccak includes a unique structure, which is demonstrated to be safer and more reliable than the other algorithms. This is why it was chosen by NIST. The SHA-3 algorithm is based on sponge functions (or sponge construction), as opposed to the Merkle Damgrd construction used by SHA-1 and SHA-2, if you were to look at it from a technical standpoint.

Until today, there were no major SHA-2 attacks, but it doesn’t change the belief that hash functions could be breached eventually. If this happens, it will take a long time to establish a new one.

Speaking of which, there were, however, successful breaches through SHA-1. They took place back in 2004 and 2005. This was the stepping stone of the idea to develop a new standard function.

Following that, in 2012, Keccak was finally considered to be the newest addition to the collection of SHAs. It was the third version - SHA-3.

Even though SHA-2 is a previous version, it’s still used and considered to be safe. To specify, it’s employed by various cryptocurrencies including Bitcoin. It is a part of the mining process.

Considering the safety and low level of attack possibility SHA-3 is seeing an increasing adoption as well. But it doesn’t stop there. In the future, there will be even more new and innovative hash algorithms being created. It’s mandatory since the cryptography industry is always evolving and solving numerous issues.

private keys<\/strong><\/a>, and so on.<\/p>\n<p>Keyloggers have evolved from eavesdropping instruments commonly employed by criminals or governmental entities, to a commercial industry of their own, permitting the average person to buy their own edition of keylogging software.&nbsp;<\/p>\n<p>Parental supervision is a typical, more harmless use case for keyloggers, in which parents may track their children's internet activity.<\/p>\n<p>Keyloggers can also be used for lawful purposes. System administrators, for example, may deploy keylogging software to monitor employees' activity. Keyloggers are also important for law enforcement since they may be used to track offenders and efficiently transfer all recorded data to all offices.<\/p>\n<p>The three most important types of hardware keyloggers are:<\/p>\n<ul>\n<li>USB-loaded keyloggers that give the computer a keystroke logger malware.<\/li>\n<li><strong>Hidden camera loggers<\/strong> typically visually controlled keystrokes.<\/li>\n<li>Keyboard hardware keyloggers can be built-in or linked to a device using a cable.<\/li>\n<\/ul>\n<p>Furthermore, keyloggers may be used to acquire digital currency from individuals by capturing their exchange passwords or collecting their private keys from their crypto <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-wallet/">wallets.&nbsp;/n

This danger is readily addressed by utilizing a hardware wallet and enabling the <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-two-factor-authentication-2fa/">two-factor authentication (2FA)<\/strong><\/strong><\/a> option in exchange accounts. The two-factor authentication is supported by the vast majority of the biggest cryptocurrency exchanges.<\/p>\n<p>Additionally, the simplest technique to discover a software keylogger is to examine the system functions. If you see anything unusual, you must look it up online to check if it is from legal software or a known keylogger.&nbsp;<\/p>\n<p>Checking your computer's data flow would also be a wise decision.<\/p>","definition":"is a tool utilized by hackers to document keystrokes that were made by users, either through a software program or a hardware device.","status":"published","meta_title":"What is Keylogger? Definition & Meaning | Crypto Wiki","meta_description":"Keylogger meaning: Keylogger - is a tool utilized by hackers to document keystrokes that were made by users, either through a software program or a hardware device.","meta_keywords":null}" :prev-section="{"id":444,"wikipedia_url":"https:\/\/en.wikipedia.org\/wiki\/Fear_of_missing_out#Variants","level":"easy","author_id":1,"created_at":"2023-06-19T06:59:00.000000Z","updated_at":"2024-01-03T04:54:55.000000Z","slug":"what-is-jomo","title":"What is JOMO?","section":"J","keyword":"JOMO","content":"<p>To specify, JOMO refers to <strong>a trader who is content not to participate in a current cryptocurrency trend or panic selling.<\/strong><\/p>\n<p>Everyone is aware by now that <a href=https://www.bitdegree.org/"//crypto//buy-bitcoin-btc/">Bitcoin and other crypto-assets are highly <strong>volatile.<\/strong> This indicates that investors who have avoided purchasing in Bitcoin and other cryptocurrencies are prone to having JOMO when prices decline.<\/p>\n<p>It is usually utilized by no-coiners who don&rsquo;t avoid emphasizing their happiness of not being involved in cryptocurrencies, especially when there is an <strong><a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-initial-coin-offering-ico/">ICO scam<\/strong> that was revealed, or when the prices are dropping down in general. However, the greatest cause of JOMO is likely to be experienced when ICOs are shown to be fraudulent, confirming the perception that cryptocurrencies are unstable.<\/p>\n<p>In addition, <strong>holders<\/strong> are the investors who hold their cryptocurrencies instead of selling them, even though they are losing profit.<\/p>\n<p>BTC price, for instance, fell from <strong>$20,089<\/strong> in December 2017 to slightly over <strong>$3,000<\/strong> in December 2018, referring to a reduction of <strong>80%.<\/strong> Many who did not have a connection to Bitcoin, or those who sold it before the price collapsed, are likely to have experienced any level of JOMO in this scenario.<\/p>\n<p>Likewise, investors hung on to BTC following its rapid price collapse in 2018 and might have gone through JOMO.<\/p>\n<p><strong>All in all, JOMO refers to a trader who is content not to participate in a current cryptocurrency surge or in the act of selling to earn a profit and avoid loss.<\/strong><\/p>","definition":"is short for \u201cjoy of missing out\u201d and it is the opposite of FOMO or \u201cfear of missing out\u201d.","status":"published","meta_title":"What is JOMO? Definition & Meaning | Crypto Wiki","meta_description":"JOMO meaning: JOMO - is short for \u201cjoy of missing out\u201d and it is the opposite of FOMO or \u201cfear of missing out\u201d.","meta_keywords":null}" :model="{"id":992,"wikipedia_url":"https:\/\/en.wikipedia.org\/wiki\/Keccak","level":"medium","author_id":1,"created_at":"2023-06-19T06:59:01.000000Z","updated_at":"2024-01-03T07:31:09.000000Z","slug":"what-is-keccak","title":"What is Keccak?","section":"K","keyword":"Keccak","content":"<p><strong>Keccak is a cryptographic mechanism<\/strong> that was created by Gilles Van Assche, Guido Bertoni, Joan Daemen, and Michael Peeters. It offers the best and most upgraded security compared to how it was with older <strong>SHA-1 and SHA-2<\/strong> <strong>hash functions<\/strong>. However, the algorithm is used for other functions as well.<\/p>\n<p>2007 was approximately the year when the Keccak function started to be created. It took place after NIST's announcement of a public competition and testing procedure for a new cryptographic hash function capable of overcoming the possible weaknesses of the prior SHA-1 and SHA-2.<\/p>\n<p>To put things into perspective, <strong>the Secure Hash Algorithm (SHA) is a collection of cryptographic hash functions<\/strong> that were published by the U.S. National Institute of Standards and Technology (NIST). Speaking of the earlier versions, SHA-1, and SHA-2, these are very similar and were created by the US National Security Agency (NSA).<\/p>\n<p>Conceptual attacks on SHA-1 were carried out in 2004 and made public in 2005. NIST announced SHA-2 as the new standard hash function to be used a few years later, in 2011. However, the transition from SHA-1 to SHA-2 was extremely slow, and it wasn't until early 2017 that a considerable number of developers and computer scientists made the switch.&nbsp;<\/p>\n<p>Soon afterward, in February 2017, Google disclosed an effective SHA-1 collision attack. Since then, SHA-1 is no longer regarded as safe, and its use is banned.<\/p>\n<p><strong>Even though Keccak has the same hash lengths as SHA-2, they are still distinct<\/strong>. This is why Keccak is also considered to be SHA-3.<\/p>\n<p>Because Keccak includes a unique structure, which is demonstrated to be safer and more reliable than the other algorithms. This is why it was chosen by NIST. The SHA-3 algorithm is based on sponge functions (or sponge construction), as opposed to the Merkle Damgrd construction used by SHA-1 and SHA-2, if you were to look at it from a technical standpoint.<\/p>\n<p>Until today, there were no major SHA-2 attacks, but it doesn&rsquo;t change the belief that hash functions could be breached eventually. If this happens, it will take a long time to establish a new one.<\/p>\n<p>Speaking of which, there were, however, successful breaches through SHA-1. They took place back in 2004 and 2005. This was the stepping stone of the idea to develop a new standard function.<\/p>\n<p>Following that, in 2012, Keccak was finally considered to be the newest addition to the collection of SHAs. It was the third version - SHA-3.<\/p>\n<p>Even though SHA-2 is a previous version, it&rsquo;s still used and considered to be safe. To specify, it&rsquo;s employed by various cryptocurrencies including <a href=https://www.bitdegree.org/"//crypto//buy-bitcoin-btc/">Bitcoin. It is a part of the <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-mining/">mining process.<\/p>\n<p>Considering the safety and low level of attack possibility SHA-3 is seeing an increasing adoption as well. But it doesn&rsquo;t stop there. In the future, there will be even more new and innovative hash algorithms being created. It&rsquo;s mandatory since the cryptography industry is always evolving and solving numerous issues.<\/p>","definition":"can also be referred to as SHA-3 is a cryptographic algorithm.","status":"published","meta_title":"What is Keccak? Definition & Meaning | Crypto Wiki","meta_description":"Keccak meaning: Keccak - can also be referred to as SHA-3 is a cryptographic algorithm.","meta_keywords":null,"author":{"id":1,"user_id":1,"created_at":"2023-05-03T14:30:55.000000Z","updated_at":"2023-05-11T07:18:20.000000Z","title":"Editor-In-Chief","slug":"aaron-s-editor-in-chief","description":"<p>Having completed a Master&rsquo;s degree on Economics, Politics &amp; Culture for the East Asia region, Aaron has written scientific papers with a comparative analysis of the differences between US&rsquo; Western and Japan&rsquo;s Collective forms of capitalism, 1945-2020.<\/p>\n<p>With close to a decade of experience in the FinTech industry, Aaron understands all of the biggest issues and struggles that crypto enthusiasts face. He&rsquo;s a passionate analyst who is concerned with data-driven and fact-based content, as well as that which speaks to both Web3 natives and industry newcomers.<\/p>\n<p>Aaron is the go-to person for everything and anything related to digital currencies. With a huge passion for blockchain &amp; Web3 education, Aaron strives to transform the space as we know it, and make it more approachable to complete beginners.<\/p>\n<p>Aaron has been quoted by multiple established outlets, and is a published author himself. Even during his free time, he enjoys researching the market trends, and looking for the next supernova.<\/p>","user":{"id":1,"first_name":"Aaron","last_name":"S.","email":"aaron@bitdegree.org","email_sanitized":"aaron@bitdegree.org","email_verified_at":"2023-12-01T09:40:20.000000Z","must_verify_email":false,"is_registered_with_wallet":false,"status":"active","country":"LT","last_connected_ip":"88.119.132.125","image_id":2641,"referral_token":"05TMu2NysXOCn525","referred_by":null,"created_at":"2023-05-03T14:30:55.000000Z","updated_at":"2024-01-09T15:22:21.000000Z","full_name":"Aaron S."}}}" :chapter-list="[{"id":1,"title":"Blockchain","slug":"blockchain","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-blockchain.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/blockchain-101.jpg","rating":100,"sections":[{"chapter_id":1,"order":1,"slug":"what-is-blockchain","title":"What is the Blockchain?","status":"published","modified_content":null},{"chapter_id":1,"order":2,"slug":"decentralized-blockchain","title":"Anonymous & Decentralized Blockchains: The Cornerstone of Crypto","status":"published","modified_content":null},{"chapter_id":1,"order":3,"slug":"blockchain-transaction","title":"What is a Blockchain Transaction in Crypto?","status":"published","modified_content":null},{"chapter_id":1,"order":4,"slug":"crypto-fees","title":"The Different Types of Crypto Fees Explained","status":"published","modified_content":null},{"chapter_id":1,"order":5,"slug":"what-is-bridging-in-crypto","title":"The Key Notion Behind the Concept of Bridging in Crypto","status":"published","modified_content":null},{"chapter_id":1,"order":6,"slug":"types-of-blockchains","title":"Different Types of Blockchains: What to Look Out For?","status":"published","modified_content":null}]},{"id":2,"title":"Cryptocurrencies","slug":"cryptocurrencies","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-cryptocurrencies.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/cryptocurrencies-101.jpg","rating":100,"sections":[{"chapter_id":2,"order":1,"slug":"what-is-a-cryptocurrency","title":"What is a Cryptocurrency?","status":"published","modified_content":null},{"chapter_id":2,"order":2,"slug":"how-does-cryptocurrency-work","title":"How Does Cryptocurrency Work?","status":"published","modified_content":null},{"chapter_id":2,"order":3,"slug":"is-cryptocurrency-a-good-investment","title":"Is Cryptocurrency a Good Investment? The Pros & Cons","status":"published","modified_content":null},{"chapter_id":2,"order":4,"slug":"coin-vs-token","title":"Coin VS Token: How Do They Differ?","status":"published","modified_content":null},{"chapter_id":2,"order":5,"slug":"what-are-stablecoins","title":"What are Stablecoins, Altcoins & Wrapped Coins?","status":"published","modified_content":null},{"chapter_id":2,"order":6,"slug":"what-is-a-bitcoin","title":"Bitcoin: the Pioneer of the Crypto World","status":"published","modified_content":null},{"chapter_id":2,"order":7,"slug":"what-is-ethereum","title":"The Ultimate Blockchain for dApp Creation: Ethereum","status":"published","modified_content":null},{"chapter_id":2,"order":8,"slug":"what-is-cardano-in-crypto","title":"What is Cardano and What is It Used For?","status":"published","modified_content":null},{"chapter_id":2,"order":9,"slug":"what-is-shiba-inu-coin","title":"Shiba Inu: the Dogecoin Killer","status":"published","modified_content":null},{"chapter_id":2,"order":10,"slug":"what-is-solana-in-crypto","title":"Is Solana an Improved Version of Ethereum?","status":"published","modified_content":null},{"chapter_id":2,"order":11,"slug":"what-is-polkadot-in-crypto","title":"The Bridge Between Blockchains: Polkadot","status":"published","modified_content":null},{"chapter_id":2,"order":12,"slug":"what-is-polygon-in-crypto","title":"Polygon: the Essential Scaling Solution for Ethereum","status":"published","modified_content":null},{"chapter_id":2,"order":13,"slug":"what-is-luna-crypto","title":"The Bumpy Road of Terra (LUNA)","status":"published","modified_content":null},{"chapter_id":2,"order":14,"slug":"what-is-fantom-crypto","title":"Is Fantom (FTM) Yet Another Ethereum Killer?","status":"published","modified_content":null},{"chapter_id":2,"order":15,"slug":"what-is-aave-crypto","title":"Aave: Crypto Lending Trailblazer","status":"published","modified_content":null},{"chapter_id":2,"order":16,"slug":"what-is-algorand-crypto","title":"Did Algorand Truly Solve the Blockchain Trilemma?","status":"published","modified_content":null},{"chapter_id":2,"order":17,"slug":"what-is-olympus-dao","title":"Does Olympus DAO Have Anything to Do With Mythology?","status":"published","modified_content":null},{"chapter_id":2,"order":18,"slug":"what-is-avax","title":"Is Avalanche Network (AVAX) Rightfully Called the Future of DeFi?","status":"published","modified_content":null},{"chapter_id":2,"order":19,"slug":"what-is-monero-coin","title":"Monero: Where Cryptocurrency Meets Cryptography","status":"published","modified_content":null},{"chapter_id":2,"order":20,"slug":"what-is-ripple-xrp","title":"Is Ripple \"it\" When it Comes to Cross-Border Transactions?","status":"published","modified_content":null},{"chapter_id":2,"order":21,"slug":"practical-use-of-cryptocurrencies","title":"The Practical Use of Crypto","status":"published","modified_content":null}]},{"id":3,"title":"Crypto Exchanges","slug":"crypto-exchanges","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-exchanges.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-exchanges-101.jpg","rating":80,"sections":[{"chapter_id":3,"order":1,"slug":"how-do-cryptocurrency-exchanges-work","title":"How do Cryptocurrency Exchanges Work?","status":"published","modified_content":null},{"chapter_id":3,"order":2,"slug":"dex-vs-cex","title":"DEX VS CEX: Two Sides of the Crypto Exchange Industry","status":"published","modified_content":null},{"chapter_id":3,"order":3,"slug":"crypto-day-trading","title":"Crypto Day Trading: The Difference Between Buying, Trading, and Swapping","status":"published","modified_content":null},{"chapter_id":3,"order":4,"slug":"kyc-crypto","title":"KYC & AML: The Key to Complying With Legal Industry Standards","status":"published","modified_content":null},{"chapter_id":3,"order":5,"slug":"how-to-buy-crypto","title":"From Fiat to Crypto: How to Buy Crypto for the First Time","status":"published","modified_content":null},{"chapter_id":3,"order":6,"slug":"fiat-to-crypto","title":"Taking Profits: Turning Crypto Into Fiat","status":"published","modified_content":null},{"chapter_id":3,"order":7,"slug":"how-to-use-crypto","title":"You\u2019ve Got Crypto: What Can You Do With It?","status":"published","modified_content":null}]},{"id":4,"title":"Crypto Wallets","slug":"crypto-wallets","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-wallets.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-wallets-101.jpg","rating":80,"sections":[{"chapter_id":4,"order":1,"slug":"what-is-a-crypto-wallet","title":"What is a Crypto Wallet?","status":"published","modified_content":null},{"chapter_id":4,"order":2,"slug":"hot-wallet-vs-cold-wallet","title":"Hot Wallet VS Cold Wallet: Which One to Pick?","status":"published","modified_content":null},{"chapter_id":4,"order":3,"slug":"non-custodial-wallet","title":"What are Non-Custodial Crypto Wallets?","status":"published","modified_content":null},{"chapter_id":4,"order":4,"slug":"what-is-metamask","title":"Metamask: The Leading Non-Custodial Wallet","status":"published","modified_content":null},{"chapter_id":4,"order":37,"slug":"how-safe-is-cryptocurrency","title":"The Key Crypto Wallet Safety Practices: How Safe Can Crypto Be?","status":"published","modified_content":null}]},{"id":5,"title":"NFTs","slug":"nfts","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-nfts.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/nfts-101.jpg","rating":100,"sections":[{"chapter_id":5,"order":2,"slug":"how-to-trade-nfts","title":"NFT Trading: The Ins and Outs","status":"published","modified_content":null},{"chapter_id":5,"order":3,"slug":"buying-nft","title":"Tips and Tricks of Choosing the Right NFTs","status":"published","modified_content":null},{"chapter_id":5,"order":4,"slug":"how-to-store-nft","title":"How to Store NFTs: Best Practices","status":"published","modified_content":null},{"chapter_id":5,"order":5,"slug":"how-to-create-an-nft","title":"How to Create Your Own NFTs?","status":"published","modified_content":null},{"chapter_id":5,"order":6,"slug":"how-to-make-passive-money-with-nft","title":"Making Passive Money with NFTs","status":"published","modified_content":null}]},{"id":6,"title":"dApps & Defi","slug":"dapps-and-defi","updated":true,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-dapps.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/dapps-defi-101.jpg","rating":80,"sections":[{"chapter_id":6,"order":1,"slug":"what-are-nfts","title":"What are Non-Fungible Tokens (NFTs)?","status":"published","modified_content":null},{"chapter_id":6,"order":1,"slug":"what-is-defi","title":"What is Decentralized Finance (DeFi)?","status":"published","modified_content":null},{"chapter_id":6,"order":2,"slug":"what-is-defi-2-0","title":"DeFi 2.0: The New Version of Decentralized Finance","status":"published","modified_content":null},{"chapter_id":6,"order":3,"slug":"what-are-dapps-in-crypto","title":"What Are dApps and How Do They Work?","status":"published","modified_content":null},{"chapter_id":6,"order":4,"slug":"defi-dapps","title":"Picking the Right dApps: Dos and Don'ts","status":"published","modified_content":null},{"chapter_id":6,"order":5,"slug":"what-is-web-3-0","title":"Web 3.0: The Future of the Internet","status":"published","modified_content":null},{"chapter_id":6,"order":6,"slug":"what-are-smart-contracts","title":"What is the Core Purpose of Smart Contracts?","status":"published","modified_content":null},{"chapter_id":6,"order":7,"slug":"what-is-a-dao-in-crypto","title":"The Notion of a Decentralized Autonomous Ogranization (DAO)","status":"published","modified_content":null},{"chapter_id":6,"order":8,"slug":"what-is-staking-in-crypto","title":"What is the Goal of Staking Crypto Assets?","status":"published","modified_content":null},{"chapter_id":6,"order":9,"slug":"what-is-liquidity-pool-in-crypto","title":"What is a Liquidity Pool and How Does It Work?","status":"published","modified_content":null},{"chapter_id":6,"order":10,"slug":"what-is-automated-market-maker","title":"Automated Market Maker: the Cornerstone of the Decentralized Crypto Exchange Industry","status":"published","modified_content":null},{"chapter_id":6,"order":11,"slug":"what-is-yield-farming-in-crypto","title":"The Main Yield Farming Techniques","status":"published","modified_content":null},{"chapter_id":6,"order":12,"slug":"what-is-an-oracle-in-crypto","title":"Crypto Oracles: The Link Between Blockchain and Outside World Data","status":"published","modified_content":null},{"chapter_id":6,"order":13,"slug":"crypto-gambling","title":"The Peculiarities of Decentralized Crypto Gambling","status":"published","modified_content":null},{"chapter_id":6,"order":14,"slug":"what-is-the-metaverse","title":"Metaverse: A New Perception of Reality","status":"published","modified_content":null}]},{"id":7,"title":"Trading & Investing","slug":"trading-and-investing","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-trading.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-trading-101.jpg","rating":80,"sections":[{"chapter_id":7,"order":1,"slug":"where-to-trade-crypto","title":"Where Can You Trade Cryptocurrencies?","status":"published","modified_content":null},{"chapter_id":7,"order":2,"slug":"how-to-invest-in-crypto","title":"Investing in Crypto: What Investing Options Do You Have?","status":"published","modified_content":null},{"chapter_id":7,"order":3,"slug":"ico-vs-ido","title":"ICO vs IDO vs IEO: Which One is the One?","status":"published","modified_content":null},{"chapter_id":7,"order":4,"slug":"what-is-an-airdrop","title":"What are Crypto Airdrops and How to Get Them?","status":"published","modified_content":null},{"chapter_id":7,"order":5,"slug":"how-to-get-free-crypto","title":"How to Get Free Crypto Assets?","status":"published","modified_content":null},{"chapter_id":7,"order":6,"slug":"how-to-arbitrage-crypto","title":"What is Crypto Arbitrage: The Main Principles","status":"published","modified_content":null},{"chapter_id":7,"order":7,"slug":"what-is-a-perpetual-contract","title":"Perpetual Contracts: Futures Contracts Without an Expiration Date","status":"published","modified_content":null},{"chapter_id":7,"order":8,"slug":"what-is-fud","title":"What is FUD: How to Use It to Your Advantage While Investing in Crypto?","status":"published","modified_content":null},{"chapter_id":7,"order":9,"slug":"investing-in-cryptocurrency","title":"Investing in Cryptocurrency: How to Manage Your Risks?","status":"published","modified_content":null},{"chapter_id":7,"order":10,"slug":"what-is-a-rug-pull-in-crypto","title":"What is a Rug Pull in Crypto?","status":"published","modified_content":null},{"chapter_id":7,"order":11,"slug":"how-to-avoid-rug-pulls-in-crypto","title":"How to Spot and Avoid Rug Pulls?","status":"published","modified_content":null},{"chapter_id":7,"order":12,"slug":"how-to-avoid-crypto-taxes","title":"The Key Legal Techniques of Avoiding Crypto Taxes","status":"published","modified_content":null}]},{"id":8,"title":"Crypto Analysis","slug":"crypto-analysis","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-analysis.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-analysis-101.jpg","rating":100,"sections":[{"chapter_id":8,"order":1,"slug":"what-is-bullish-and-bearish","title":"Bearish and Bullish Markets: Do They Matter?","status":"published","modified_content":null},{"chapter_id":8,"order":2,"slug":"best-technical-analysis-indicators-for-crypto","title":"5 Best Crypto Technical Analysis Indicators You Must Know About","status":"published","modified_content":null},{"chapter_id":8,"order":3,"slug":"what-is-candlesticks","title":"Technical Analysis: What are Candlesticks, Trendlines, and Patterns?","status":"published","modified_content":null},{"chapter_id":8,"order":4,"slug":"how-to-track-new-crypto-coins","title":"Crypto Tracking: How to Track Your Favorite Coins & Tokens?","status":"published","modified_content":null},{"chapter_id":8,"order":5,"slug":"how-to-research-crypto","title":"Crypto Research Fundamentals & Social Signals: Your Daily Trading Strategy","status":"published","modified_content":null},{"chapter_id":8,"order":46,"slug":"portfolio-diversification-definition","title":"Portfolio Diversification: The Whats, the Whys, and the Hows","status":"published","modified_content":null}]},{"id":9,"title":"Mining","slug":"mining","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-mining.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-mining-101.jpg","rating":80,"sections":[{"chapter_id":9,"order":1,"slug":"what-is-crypto-mining","title":"Crypto Mining: What It is and How Does It Work?","status":"published","modified_content":null},{"chapter_id":9,"order":2,"slug":"what-is-a-mining-pool","title":"Mining Pools: Is Collective Mining Better Than Solo Mining?","status":"published","modified_content":null},{"chapter_id":9,"order":3,"slug":"what-is-staking-crypto","title":"An Advanced Look into What is Staking Crypto","status":"published","modified_content":null},{"chapter_id":9,"order":4,"slug":"what-is-proof-of-stake-vs-proof-of-work","title":"Proof-of-Work VS Proof-of-Stake: The Differences That Matter","status":"published","modified_content":null},{"chapter_id":9,"order":5,"slug":"what-is-crypto-mining-rig","title":"Crypto Mining Rig: What It is and How to Build One?","status":"published","modified_content":null}]},{"id":10,"title":"Crypto Terms","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/crypto-101-glossary.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-glossary-101.jpg","rating":100,"sections":["A","B","C","D","E","F","G","H","I","J","K","L","M","N","O","P","Q","R","S","T","U","V","W","X","Y","Z"]}]" current-chapter="K" current-section="what-is-keccak">