🚨 Get Your Free NFT Certificate Mint by Completing the Web3 Exam! START NOW
Learn to gain real rewards

Learn to gain real rewards

Collect Bits, boost your Degree and gain actual rewards!

New
Video Courses
Video Courses
Deprecated
Scale your career with online video courses. Dive into your learning adventure!
Crypto Terms:  Letter P

What is Permissionless?

Meaning:
Permissionless - a system without a central authority that regulates who can use it and how.
medium
3 minutes

Let's find out Permissionless meaning, definition in crypto, what is Permissionless, and all other detailed facts.

A permissionless system is a term used to describe most blockchain networks. In a permissionless system, no central entity can control who can use it nor limit its utility. The users are not constrained by any restrictions and do not require permission to use the system in question.

The permissionless systems used for cryptocurrencies and other blockchain-based technologies are among the standout features. Blockchain-based cryptocurrency Bitcoin (BTC) is considered permissionless as it can be used by anyone to the extent that the protocol itself can handle.

Cryptocurrencies can be used by entities that, for various reasons, cannot use central banking systems, such as political dissidents, blacklisted organizations, or criminals. Transactions on permissionless blockchains can’t be censored.

Permissioned systems, like traditional financial institutions, are overseen by a central entity that can limit access to the system and how it can be used. Institutions like banks can restrict who can open accounts and use financial services, as well as which services they can access in particular.

Some blockchain systems may be permissioned and have limited accessibility to the broader audience. Private blockchain networks are used by large-scale organizations and the access is only granted to the market participants by whitelisting certain addresses.

The core idea of the blockchain and crypto communities is decentralization. Based on this principle, no central party should have the authority to allow or deny access to the services provided by permissionless platforms. In many cases, entities that want to access a permissionless network do not need to provide any proof or meet KYC requirements.

Permissionless blockchain networks ensure that the users cannot be censored or discriminated against on any grounds. All users have equal opportunities to participate in and utilize the system as they please, regardless of their identity.

Many permissionless networks use decentralized consensus mechanisms like Proof-of-Work (PoW) or Proof-of-Stake (PoS). Relying on such measures ensures that the system is managed by a network of participants or nodes, known as miners and stakers.

The network nodes work on maintaining the system viability and ensure the operations are seamless and honest. Cryptocurrencies like Bitcoin (BTC), Ethereum (ETH), and Monero (XMR) function as permissionless networks.

Permissioned networks, like Meta’s Diem or blockchains developed for enterprises, can be restricted by a central authority who can limit the overall access to the network or some of its functions. Such networks also typically require the users to provide proof of identification.

Permissioned networks use a limited number of validators who provide cryptographic security, and are given authority to produce new blocks and otherwise contribute to the network development.

derivative that is <strong>similar to <\/strong><a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-are-futures/">futures contracts<\/strong><\/a> because it uses tokens as <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-collateral/">collateral to open a leveraged position but doesn&rsquo;t have an expiration date. If you forecast that the price of that asset will rise, and it does, you receive more tokens than you put in when you close your trade. If it&rsquo;s the opposite situation, you receive less than what you invested.<\/p>\n<p>As mentioned before, <strong>expiration is the main distinction between futures and perpetual contracts<\/strong>. Futures contracts are resolved after a predetermined time period, but perpetual contracts have no expiration or settlement date, allowing you to keep a contract indefinitely.<\/p>\n<p>As the expiry date approaches, the price of classic futures contracts increasingly converges with the spot market price of the underlying asset. Since they don't have an expiration date, perpetual contracts have a premium known as a <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-are-funding-payments/">funding payment<\/strong><\/a>, which is paid between traders to keep the price in line with the spot market.<\/p>\n<p>When the contract price is higher than the spot price, traders holding <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-longing-long-position/">long positions<\/strong><\/a> have to compensate traders holding <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-short/">short positions<\/strong><\/a>, and vice versa. These payments are made on regular intervals (typically 1 hour or 8 hours).<\/p>\n<p>Perpetual contracts are the most traded cryptocurrency instrument thanks to their ease of use and versatility.<\/p>","definition":"derivatives that are similar to futures contracts but don\u2019t have an expiration date.","status":"published","meta_title":"What are Perpetual Contracts? Definition & Meaning | Crypto Wiki","meta_description":"Perpetual Contracts meaning: Perpetual Contracts - derivatives that are similar to futures contracts but don\u2019t have an expiration date.","meta_keywords":null}" :prev-section="{"id":573,"wikipedia_url":"https:\/\/en.wikipedia.org\/wiki\/Ethereum#Permissioned_ledgers","level":"easy","author_id":1,"created_at":"2023-06-19T06:59:00.000000Z","updated_at":"2023-12-07T19:51:27.000000Z","slug":"what-is-permissioned-ledger","title":"What is Permissioned Ledger?","section":"P","keyword":"Permissioned Ledger","content":"<p>A permissioned ledger is a closed-source <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-distributed-ledger-technology-dlt/">distributed ledger technology (DLT)<\/strong><\/a> variant that is restricted in a way that only people or organizations with permission can access it. This distinguishes them from public networks like <a href=https://www.bitdegree.org/"https:////www.bitdegree.org//crypto//buy-bitcoin-btc/">Bitcoin and <a href=https://www.bitdegree.org/"https:////www.bitdegree.org//crypto//buy-ethereum-eth/">Ethereum, which are open to everyone and do not require prior authorization.<\/p>\n<p>A permissioned ledger <strong>differs from a centralized database<\/strong> in that it has several participants and no single point of failure. Besides, all data of a permissioned ledger is verifiable, unlike in centralized databases, employing <strong>secure cryptography<\/strong> and digitally verified signatures.<\/p>\n<p>The main features of permissioned ledgers include:<\/p>\n<ul>\n<li>They can be based on existing public networks. However, their design and implementation significantly differ.<\/li>\n<li>They are <strong>tokenless<\/strong>.<\/li>\n<li>They perform effectively.<\/li>\n<li>They enable businesses and enterprises to share critical data in a secure, cost-effective, and discreet manner.<\/li>\n<li>In terms of <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-immutable/">immutability, permissioned ledgers are similar to public ledgers, however, the latter is generally a lot stronger in this regard.<\/li>\n<li>They have a semi-centralized <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-governance/">governance structure that requires the approval of all permitted participants. Decentralization, <strong>transparency<\/strong>, anonymity, security, and censorship resistance vary widely among such systems.<\/li>\n<li>They have an advantage over their <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-permissionless/">permissionless equivalents in legal and regulatory matters.&nbsp;<\/li>\n<\/ul>\n<p>R3, B3i, and <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-hyperledger-hyperledger-foundation/">Hyperledger are typical examples of permissioned ledgers.<\/p>","definition":"a ledger that is restricted in a way that only people or organizations with permission can access it.","status":"published","meta_title":"What is Permissioned Ledger? Definition & Meaning | Crypto Wiki","meta_description":"Permissioned Ledger meaning: Permissioned Ledger - a ledger that is restricted in a way that only people or organizations with permission can access it.","meta_keywords":null}" :model="{"id":602,"wikipedia_url":"https:\/\/en.wikipedia.org\/wiki\/Blockchain","level":"medium","author_id":1,"created_at":"2023-06-19T06:59:00.000000Z","updated_at":"2023-12-07T19:20:27.000000Z","slug":"what-is-permissionless","title":"What is Permissionless?","section":"P","keyword":"Permissionless","content":"<p>A <strong>permissionless<\/strong> system is a term used to describe most <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-blockchain/">blockchain networks. In a permissionless system, no central entity can control who can use it nor limit its utility. The users are not constrained by any restrictions and do not require permission to use the system in question.<\/p>\n<p>The permissionless systems used for <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-cryptocurrency/">cryptocurrencies and other <strong>blockchain-based technologies<\/strong> are among the standout features. Blockchain-based cryptocurrency <a href=https://www.bitdegree.org/"https:////www.bitdegree.org//crypto//buy-bitcoin-btc/">Bitcoin (BTC)<\/strong><\/a> is considered permissionless as it can be used by anyone to the extent that the protocol itself can handle.<\/p>\n<p>Cryptocurrencies can be used by entities that, for various reasons, cannot use central banking systems, such as <strong>political dissidents<\/strong>, blacklisted organizations, or criminals. Transactions on permissionless blockchains can&rsquo;t be censored.<\/p>\n<p>Permissioned systems, like traditional financial institutions, are overseen by a central entity that can <strong>limit access to the system<\/strong> and how it can be used. Institutions like banks can restrict who can open accounts and use financial services, as well as which services they can access in particular.<\/p>\n<p>Some blockchain systems may be permissioned and have limited accessibility to the broader audience. <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-private-blockchain/">Private blockchain networks<\/strong><\/strong><\/a> are used by large-scale organizations and the access is only granted to the market participants by <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-whitelist/">whitelisting certain addresses.<\/p>\n<p>The core idea of the blockchain and crypto communities is <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-decentralization/">decentralization. Based on this principle, <strong>no central party should have the authority to allow or deny access to the services provided by permissionless platforms<\/strong>. In many cases, entities that want to access a permissionless network do not need to provide any proof or meet <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-know-your-customer-kyc/">KYC requirements.<\/p>\n<p>Permissionless blockchain networks ensure that the users cannot be censored or discriminated against on any grounds. All users have equal opportunities to participate in and utilize the system as they please, regardless of their identity.<\/p>\n<p>Many permissionless networks use decentralized consensus mechanisms like <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-proof-of-work-pow/">Proof-of-Work (PoW)<\/strong><\/strong><\/a> or <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-proof-of-stake-pos/">Proof-of-Stake (PoS)<\/strong><\/a>. Relying on such measures ensures that the system is managed by a network of participants or <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-node/">nodes, known as miners and stakers.<\/p>\n<p>The <strong>network nodes<\/strong> work on maintaining the system viability and ensure the operations are seamless and honest. Cryptocurrencies like Bitcoin (BTC), <a href=https://www.bitdegree.org/"https:////www.bitdegree.org//crypto//buy-ethereum-eth/">Ethereum (ETH)<\/strong><\/a>, and <strong>Monero (XMR)<\/strong> function as permissionless networks.<\/p>\n<p>Permissioned networks, like Meta&rsquo;s Diem or blockchains developed for enterprises, can be restricted by a central authority who can limit the overall access to the network or some of its functions. Such networks also typically require the users to provide <strong>proof of identification<\/strong>.<\/p>\n<p>Permissioned networks use a limited number of validators who provide cryptographic security, and are given authority to produce new blocks and otherwise contribute to the network development.<\/p>","definition":"a system without a central authority that regulates who can use it and how.","status":"published","meta_title":"What is Permissionless? Definition & Meaning | Crypto Wiki","meta_description":"Permissionless meaning: Permissionless - a system without a central authority that regulates who can use it and how.","meta_keywords":null,"author":{"id":1,"user_id":1,"created_at":"2023-05-03T14:30:55.000000Z","updated_at":"2023-05-11T07:18:20.000000Z","title":"Editor-In-Chief","slug":"aaron-s-editor-in-chief","description":"<p>Having completed a Master&rsquo;s degree on Economics, Politics &amp; Culture for the East Asia region, Aaron has written scientific papers with a comparative analysis of the differences between US&rsquo; Western and Japan&rsquo;s Collective forms of capitalism, 1945-2020.<\/p>\n<p>With close to a decade of experience in the FinTech industry, Aaron understands all of the biggest issues and struggles that crypto enthusiasts face. He&rsquo;s a passionate analyst who is concerned with data-driven and fact-based content, as well as that which speaks to both Web3 natives and industry newcomers.<\/p>\n<p>Aaron is the go-to person for everything and anything related to digital currencies. With a huge passion for blockchain &amp; Web3 education, Aaron strives to transform the space as we know it, and make it more approachable to complete beginners.<\/p>\n<p>Aaron has been quoted by multiple established outlets, and is a published author himself. Even during his free time, he enjoys researching the market trends, and looking for the next supernova.<\/p>","user":{"id":1,"first_name":"Aaron","last_name":"S.","email":"aaron@bitdegree.org","email_sanitized":"aaron@bitdegree.org","email_verified_at":"2023-12-01T09:40:20.000000Z","must_verify_email":false,"is_registered_with_wallet":false,"status":"active","country":"LT","last_connected_ip":"88.119.132.125","image_id":2641,"referral_token":"05TMu2NysXOCn525","referred_by":null,"created_at":"2023-05-03T14:30:55.000000Z","updated_at":"2024-01-09T15:22:21.000000Z","full_name":"Aaron S."}}}" :chapter-list="[{"id":1,"title":"Blockchain","slug":"blockchain","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-blockchain.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/blockchain-101.jpg","rating":100,"sections":[{"chapter_id":1,"order":1,"slug":"what-is-blockchain","title":"What is the Blockchain?","status":"published","modified_content":null},{"chapter_id":1,"order":2,"slug":"decentralized-blockchain","title":"Anonymous & Decentralized Blockchains: The Cornerstone of Crypto","status":"published","modified_content":null},{"chapter_id":1,"order":3,"slug":"blockchain-transaction","title":"What is a Blockchain Transaction in Crypto?","status":"published","modified_content":null},{"chapter_id":1,"order":4,"slug":"crypto-fees","title":"The Different Types of Crypto Fees Explained","status":"published","modified_content":null},{"chapter_id":1,"order":5,"slug":"what-is-bridging-in-crypto","title":"The Key Notion Behind the Concept of Bridging in Crypto","status":"published","modified_content":null},{"chapter_id":1,"order":6,"slug":"types-of-blockchains","title":"Different Types of Blockchains: What to Look Out For?","status":"published","modified_content":null}]},{"id":2,"title":"Cryptocurrencies","slug":"cryptocurrencies","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-cryptocurrencies.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/cryptocurrencies-101.jpg","rating":100,"sections":[{"chapter_id":2,"order":1,"slug":"what-is-a-cryptocurrency","title":"What is a Cryptocurrency?","status":"published","modified_content":null},{"chapter_id":2,"order":2,"slug":"how-does-cryptocurrency-work","title":"How Does Cryptocurrency Work?","status":"published","modified_content":null},{"chapter_id":2,"order":3,"slug":"is-cryptocurrency-a-good-investment","title":"Is Cryptocurrency a Good Investment? The Pros & Cons","status":"published","modified_content":null},{"chapter_id":2,"order":4,"slug":"coin-vs-token","title":"Coin VS Token: How Do They Differ?","status":"published","modified_content":null},{"chapter_id":2,"order":5,"slug":"what-are-stablecoins","title":"What are Stablecoins, Altcoins & Wrapped Coins?","status":"published","modified_content":null},{"chapter_id":2,"order":6,"slug":"what-is-a-bitcoin","title":"Bitcoin: the Pioneer of the Crypto World","status":"published","modified_content":null},{"chapter_id":2,"order":7,"slug":"what-is-ethereum","title":"The Ultimate Blockchain for dApp Creation: Ethereum","status":"published","modified_content":null},{"chapter_id":2,"order":8,"slug":"what-is-cardano-in-crypto","title":"What is Cardano and What is It Used For?","status":"published","modified_content":null},{"chapter_id":2,"order":9,"slug":"what-is-shiba-inu-coin","title":"Shiba Inu: the Dogecoin Killer","status":"published","modified_content":null},{"chapter_id":2,"order":10,"slug":"what-is-solana-in-crypto","title":"Is Solana an Improved Version of Ethereum?","status":"published","modified_content":null},{"chapter_id":2,"order":11,"slug":"what-is-polkadot-in-crypto","title":"The Bridge Between Blockchains: Polkadot","status":"published","modified_content":null},{"chapter_id":2,"order":12,"slug":"what-is-polygon-in-crypto","title":"Polygon: the Essential Scaling Solution for Ethereum","status":"published","modified_content":null},{"chapter_id":2,"order":13,"slug":"what-is-luna-crypto","title":"The Bumpy Road of Terra (LUNA)","status":"published","modified_content":null},{"chapter_id":2,"order":14,"slug":"what-is-fantom-crypto","title":"Is Fantom (FTM) Yet Another Ethereum Killer?","status":"published","modified_content":null},{"chapter_id":2,"order":15,"slug":"what-is-aave-crypto","title":"Aave: Crypto Lending Trailblazer","status":"published","modified_content":null},{"chapter_id":2,"order":16,"slug":"what-is-algorand-crypto","title":"Did Algorand Truly Solve the Blockchain Trilemma?","status":"published","modified_content":null},{"chapter_id":2,"order":17,"slug":"what-is-olympus-dao","title":"Does Olympus DAO Have Anything to Do With Mythology?","status":"published","modified_content":null},{"chapter_id":2,"order":18,"slug":"what-is-avax","title":"Is Avalanche Network (AVAX) Rightfully Called the Future of DeFi?","status":"published","modified_content":null},{"chapter_id":2,"order":19,"slug":"what-is-monero-coin","title":"Monero: Where Cryptocurrency Meets Cryptography","status":"published","modified_content":null},{"chapter_id":2,"order":20,"slug":"what-is-ripple-xrp","title":"Is Ripple \"it\" When it Comes to Cross-Border Transactions?","status":"published","modified_content":null},{"chapter_id":2,"order":21,"slug":"practical-use-of-cryptocurrencies","title":"The Practical Use of Crypto","status":"published","modified_content":null}]},{"id":3,"title":"Crypto Exchanges","slug":"crypto-exchanges","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-exchanges.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-exchanges-101.jpg","rating":80,"sections":[{"chapter_id":3,"order":1,"slug":"how-do-cryptocurrency-exchanges-work","title":"How do Cryptocurrency Exchanges Work?","status":"published","modified_content":null},{"chapter_id":3,"order":2,"slug":"dex-vs-cex","title":"DEX VS CEX: Two Sides of the Crypto Exchange Industry","status":"published","modified_content":null},{"chapter_id":3,"order":3,"slug":"crypto-day-trading","title":"Crypto Day Trading: The Difference Between Buying, Trading, and Swapping","status":"published","modified_content":null},{"chapter_id":3,"order":4,"slug":"kyc-crypto","title":"KYC & AML: The Key to Complying With Legal Industry Standards","status":"published","modified_content":null},{"chapter_id":3,"order":5,"slug":"how-to-buy-crypto","title":"From Fiat to Crypto: How to Buy Crypto for the First Time","status":"published","modified_content":null},{"chapter_id":3,"order":6,"slug":"fiat-to-crypto","title":"Taking Profits: Turning Crypto Into Fiat","status":"published","modified_content":null},{"chapter_id":3,"order":7,"slug":"how-to-use-crypto","title":"You\u2019ve Got Crypto: What Can You Do With It?","status":"published","modified_content":null}]},{"id":4,"title":"Crypto Wallets","slug":"crypto-wallets","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-wallets.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-wallets-101.jpg","rating":80,"sections":[{"chapter_id":4,"order":1,"slug":"what-is-a-crypto-wallet","title":"What is a Crypto Wallet?","status":"published","modified_content":null},{"chapter_id":4,"order":2,"slug":"hot-wallet-vs-cold-wallet","title":"Hot Wallet VS Cold Wallet: Which One to Pick?","status":"published","modified_content":null},{"chapter_id":4,"order":3,"slug":"non-custodial-wallet","title":"What are Non-Custodial Crypto Wallets?","status":"published","modified_content":null},{"chapter_id":4,"order":4,"slug":"what-is-metamask","title":"Metamask: The Leading Non-Custodial Wallet","status":"published","modified_content":null},{"chapter_id":4,"order":37,"slug":"how-safe-is-cryptocurrency","title":"The Key Crypto Wallet Safety Practices: How Safe Can Crypto Be?","status":"published","modified_content":null}]},{"id":5,"title":"NFTs","slug":"nfts","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-nfts.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/nfts-101.jpg","rating":100,"sections":[{"chapter_id":5,"order":2,"slug":"how-to-trade-nfts","title":"NFT Trading: The Ins and Outs","status":"published","modified_content":null},{"chapter_id":5,"order":3,"slug":"buying-nft","title":"Tips and Tricks of Choosing the Right NFTs","status":"published","modified_content":null},{"chapter_id":5,"order":4,"slug":"how-to-store-nft","title":"How to Store NFTs: Best Practices","status":"published","modified_content":null},{"chapter_id":5,"order":5,"slug":"how-to-create-an-nft","title":"How to Create Your Own NFTs?","status":"published","modified_content":null},{"chapter_id":5,"order":6,"slug":"how-to-make-passive-money-with-nft","title":"Making Passive Money with NFTs","status":"published","modified_content":null}]},{"id":6,"title":"dApps & Defi","slug":"dapps-and-defi","updated":true,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-dapps.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/dapps-defi-101.jpg","rating":80,"sections":[{"chapter_id":6,"order":1,"slug":"what-are-nfts","title":"What are Non-Fungible Tokens (NFTs)?","status":"published","modified_content":null},{"chapter_id":6,"order":1,"slug":"what-is-defi","title":"What is Decentralized Finance (DeFi)?","status":"published","modified_content":null},{"chapter_id":6,"order":2,"slug":"what-is-defi-2-0","title":"DeFi 2.0: The New Version of Decentralized Finance","status":"published","modified_content":null},{"chapter_id":6,"order":3,"slug":"what-are-dapps-in-crypto","title":"What Are dApps and How Do They Work?","status":"published","modified_content":null},{"chapter_id":6,"order":4,"slug":"defi-dapps","title":"Picking the Right dApps: Dos and Don'ts","status":"published","modified_content":null},{"chapter_id":6,"order":5,"slug":"what-is-web-3-0","title":"Web 3.0: The Future of the Internet","status":"published","modified_content":null},{"chapter_id":6,"order":6,"slug":"what-are-smart-contracts","title":"What is the Core Purpose of Smart Contracts?","status":"published","modified_content":null},{"chapter_id":6,"order":7,"slug":"what-is-a-dao-in-crypto","title":"The Notion of a Decentralized Autonomous Ogranization (DAO)","status":"published","modified_content":null},{"chapter_id":6,"order":8,"slug":"what-is-staking-in-crypto","title":"What is the Goal of Staking Crypto Assets?","status":"published","modified_content":null},{"chapter_id":6,"order":9,"slug":"what-is-liquidity-pool-in-crypto","title":"What is a Liquidity Pool and How Does It Work?","status":"published","modified_content":null},{"chapter_id":6,"order":10,"slug":"what-is-automated-market-maker","title":"Automated Market Maker: the Cornerstone of the Decentralized Crypto Exchange Industry","status":"published","modified_content":null},{"chapter_id":6,"order":11,"slug":"what-is-yield-farming-in-crypto","title":"The Main Yield Farming Techniques","status":"published","modified_content":null},{"chapter_id":6,"order":12,"slug":"what-is-an-oracle-in-crypto","title":"Crypto Oracles: The Link Between Blockchain and Outside World Data","status":"published","modified_content":null},{"chapter_id":6,"order":13,"slug":"crypto-gambling","title":"The Peculiarities of Decentralized Crypto Gambling","status":"published","modified_content":null},{"chapter_id":6,"order":14,"slug":"what-is-the-metaverse","title":"Metaverse: A New Perception of Reality","status":"published","modified_content":null}]},{"id":7,"title":"Trading & Investing","slug":"trading-and-investing","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-trading.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-trading-101.jpg","rating":80,"sections":[{"chapter_id":7,"order":1,"slug":"where-to-trade-crypto","title":"Where Can You Trade Cryptocurrencies?","status":"published","modified_content":null},{"chapter_id":7,"order":2,"slug":"how-to-invest-in-crypto","title":"Investing in Crypto: What Investing Options Do You Have?","status":"published","modified_content":null},{"chapter_id":7,"order":3,"slug":"ico-vs-ido","title":"ICO vs IDO vs IEO: Which One is the One?","status":"published","modified_content":null},{"chapter_id":7,"order":4,"slug":"what-is-an-airdrop","title":"What are Crypto Airdrops and How to Get Them?","status":"published","modified_content":null},{"chapter_id":7,"order":5,"slug":"how-to-get-free-crypto","title":"How to Get Free Crypto Assets?","status":"published","modified_content":null},{"chapter_id":7,"order":6,"slug":"how-to-arbitrage-crypto","title":"What is Crypto Arbitrage: The Main Principles","status":"published","modified_content":null},{"chapter_id":7,"order":7,"slug":"what-is-a-perpetual-contract","title":"Perpetual Contracts: Futures Contracts Without an Expiration Date","status":"published","modified_content":null},{"chapter_id":7,"order":8,"slug":"what-is-fud","title":"What is FUD: How to Use It to Your Advantage While Investing in Crypto?","status":"published","modified_content":null},{"chapter_id":7,"order":9,"slug":"investing-in-cryptocurrency","title":"Investing in Cryptocurrency: How to Manage Your Risks?","status":"published","modified_content":null},{"chapter_id":7,"order":10,"slug":"what-is-a-rug-pull-in-crypto","title":"What is a Rug Pull in Crypto?","status":"published","modified_content":null},{"chapter_id":7,"order":11,"slug":"how-to-avoid-rug-pulls-in-crypto","title":"How to Spot and Avoid Rug Pulls?","status":"published","modified_content":null},{"chapter_id":7,"order":12,"slug":"how-to-avoid-crypto-taxes","title":"The Key Legal Techniques of Avoiding Crypto Taxes","status":"published","modified_content":null}]},{"id":8,"title":"Crypto Analysis","slug":"crypto-analysis","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-analysis.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-analysis-101.jpg","rating":100,"sections":[{"chapter_id":8,"order":1,"slug":"what-is-bullish-and-bearish","title":"Bearish and Bullish Markets: Do They Matter?","status":"published","modified_content":null},{"chapter_id":8,"order":2,"slug":"best-technical-analysis-indicators-for-crypto","title":"5 Best Crypto Technical Analysis Indicators You Must Know About","status":"published","modified_content":null},{"chapter_id":8,"order":3,"slug":"what-is-candlesticks","title":"Technical Analysis: What are Candlesticks, Trendlines, and Patterns?","status":"published","modified_content":null},{"chapter_id":8,"order":4,"slug":"how-to-track-new-crypto-coins","title":"Crypto Tracking: How to Track Your Favorite Coins & Tokens?","status":"published","modified_content":null},{"chapter_id":8,"order":5,"slug":"how-to-research-crypto","title":"Crypto Research Fundamentals & Social Signals: Your Daily Trading Strategy","status":"published","modified_content":null},{"chapter_id":8,"order":46,"slug":"portfolio-diversification-definition","title":"Portfolio Diversification: The Whats, the Whys, and the Hows","status":"published","modified_content":null}]},{"id":9,"title":"Mining","slug":"mining","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-mining.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-mining-101.jpg","rating":80,"sections":[{"chapter_id":9,"order":1,"slug":"what-is-crypto-mining","title":"Crypto Mining: What It is and How Does It Work?","status":"published","modified_content":null},{"chapter_id":9,"order":2,"slug":"what-is-a-mining-pool","title":"Mining Pools: Is Collective Mining Better Than Solo Mining?","status":"published","modified_content":null},{"chapter_id":9,"order":3,"slug":"what-is-staking-crypto","title":"An Advanced Look into What is Staking Crypto","status":"published","modified_content":null},{"chapter_id":9,"order":4,"slug":"what-is-proof-of-stake-vs-proof-of-work","title":"Proof-of-Work VS Proof-of-Stake: The Differences That Matter","status":"published","modified_content":null},{"chapter_id":9,"order":5,"slug":"what-is-crypto-mining-rig","title":"Crypto Mining Rig: What It is and How to Build One?","status":"published","modified_content":null}]},{"id":10,"title":"Crypto Terms","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/crypto-101-glossary.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-glossary-101.jpg","rating":100,"sections":["A","B","C","D","E","F","G","H","I","J","K","L","M","N","O","P","Q","R","S","T","U","V","W","X","Y","Z"]}]" current-chapter="P" current-section="what-is-permissionless">