brute force attack</strong></a> is a method of trying to crack a password or any encrypted information via automated guessing. Hackers employ <a href=https://www.bitdegree.org/"/crypto/learn/crypto-terms/what-are-bots/">bots that attempt to guess as many combinations of passwords as possible.</p>\n<p>The simpler the password is, the shorter the brute force attack lasts. Short passwords that contain only letters are considered weak, and it is recommended to add more characters to reinforce their security. Long passwords containing both <a href=https://www.bitdegree.org/"/crypto/learn/crypto-terms/what-does-alphanumeric-mean/">alphanumerics and special symbols are much more robust and sometimes may take millions of years to crack.</p>\n<h3>Cryptomining malware</h3>\n<p>Cryptomining malware is a relatively new method of hacking. If a user&rsquo;s computer is infected with this type of <a href=https://www.bitdegree.org/"/crypto/learn/crypto-terms/what-is-malware/">malware, it unwillingly becomes part of a crypto mining network. This can disrupt processes, cause internet speeds to slow down, and may lead to the hardware deteriorating faster.</p>\n<p>Cryptomining malware can be caught by downloading infected files or visiting suspicious websites. The process is also known as <a href=https://www.bitdegree.org/"/crypto/learn/crypto-terms/what-is-cryptojacking/">cryptojacking.

/n

Distributed Denial of Service (DDoS)</h3>\n<p><a href=https://www.bitdegree.org/"/crypto/learn/crypto-terms/what-is-distributed-denial-of-service-ddos-attack/">Distributed denial of service (DDoS)</strong></a> attacks are used to prevent users from accessing certain websites. Unlike some of the other methods listed here, DDoS attacks have to be coordinated and performed <strong>by a large number of participants</strong>.</p>\n<p>DDoS attacks are often done on a political basis. They may be used to cover information or prevent users from accessing websites of high importance. DDoS attacks are often coordinated against cryptocurrency platforms to destabilize them.</p>\n<h3>Keylogging</h3>\n<p><a href=https://www.bitdegree.org/"/crypto/learn/crypto-terms/what-is-keylogger/">Keylogging is a <a href=https://www.bitdegree.org/"/crypto/learn/crypto-terms/what-is-spyware/">spyware method. If a user&rsquo;s computer is infected with keylogging software, the hacker is able to see every character that the <strong>user types on their keyboard</strong>. This can reveal passwords, private messages, and other sensitive information.</p>\n<p>Keylogging can also affect mobile devices. Some apps that provide additional emojis or keyboard themes for the device have been proven to be keylogging spyware. Third-party text editing apps sometimes may also log the keyboard presses for unclear intents.</p>\n<h3>Phishing</h3>\n<p><a href=https://www.bitdegree.org/"/crypto/learn/crypto-terms/what-is-phishing/">Phishing involves a hacker setting up a fraudulent malware-infected website that appears legitimate. A user is tricked into clicking the link as logging into the website, which leads to the computer getting infected. The hacker can then access the files on the victim&rsquo;s computer, including login details and any other sensitive information.</p>\n<p>Phishing attacks are commonly used in the crypto world. In January 2022, the online platform Crypto.com admitted that <a href=https://www.bitdegree.org/"https://www.vice.com/en/article/g5qj9j/cryptocom-says-incident-was-actually-dollar30-million-hack/" target=\"_blank\" rel=\"nofollow noindex noopener\"><strong>$30 million worth of cryptocurrency was lost in a phishing attack</strong></a>.</p>\n<h3>Ransomware</h3>\n<p>As the name implies,&nbsp;<a href=https://www.bitdegree.org/"/crypto/learn/crypto-terms/what-is-ransomware/">ransomware involves <strong>extortion</strong> and is used for financial gains. The files on an infected computer are <a href=https://www.bitdegree.org/"/crypto/learn/crypto-terms/what-is-encryption/">encrypted. Hackers demand victims to pay a ransom for the files to be <a href=https://www.bitdegree.org/"/crypto/learn/crypto-terms/what-is-decryption/">decrypted and accessible.</p>\n<p>Ransomware can be caught by downloading suspicious files or software. However, this method of hacking is on the decline as many hackers have moved onto using cryptomining malware.</p>\n<h2>Black Hat vs White Hat Hacking</h2>\n<p>Hacking is most commonly done with malicious intent, such as terrorism, money laundering, or means to illegally sell data. However, in some cases, hacking may be done for a good cause. This disparity has led to the concept of black hat and white hat hackers.</p>\n<p><a href=https://www.bitdegree.org/"/crypto/learn/crypto-terms/what-is-black-hat-hacker/">Black hat hackers</strong></a> attack systems maliciously. Their goal is to disrupt the network for personal, usually financial gain. They are known as highly skilled computer experts that can cause severe damage to computer systems.</p>\n<p><a href=https://www.bitdegree.org/"/crypto/learn/crypto-terms/what-is-white-hat-computer-hacker/">White hat hackers</strong></strong></a> are also known for their excellent skillset. However, they perform hacks with good intentions. They are often hired by companies to find if there are any exploits in their systems. They work on discovering bugs or any entrance points that black hat hackers may find and patch them before the systems are breached.</p>\n<h2>Hacking in the Crypto Industry</h2>\n<p>Hacking is an ever-growing issue in the crypto industry. Hackers target blockchain-based systems due to the possibilities of exploitation. Some <strong>cryptocurrencies</strong>, like <a href=https://www.bitdegree.org/"https://www.bitdegree.org/crypto/buy-bitcoin-btc/">Bitcoin (BTC)</strong></a> or <a href=https://www.bitdegree.org/"https://www.bitdegree.org/crypto/buy-ethereum-eth/">Ethereum (ETH)</strong></a>, are valued at thousands of dollars for a single coin, making them a lucrative catch for malicious actors.</p>\n<p><a href=https://www.bitdegree.org/"/crypto/learn/crypto-terms/what-is-hot-wallet/">Hot wallets</strong></a> are a particularly common target. Since hot wallets require an internet connection to access the crypto assets, hackers may employ methods such as keylogging or phishing to gain access to users&rsquo; wallet addresses and claim the funds for themselves.</p>","level":"hard","meta_title":"What is Hacking? Definition & Meaning | Crypto Wiki","meta_description":"Hacking meaning: Hacking - a malicious process of manipulating another computing device to exploit it.","meta_keywords":null,"language":"en","created_at":"2022-03-17T07:13:57.000000Z","updated_at":"2022-05-13T14:32:23.000000Z","preview_url":"https://www.bitdegree.org/crypto/learn/crypto-terms/what-is-hacking"},"readingTime":4,"chapterList":[{"id":1,"title":"Blockchain","slug":"blockchain","updated":null,"chapter":"https://assets.bitdegree.org/crypto/assets/crypto-book/chapters/learn-blockchain.jpg","chapter_simple":"https://assets.bitdegree.org/crypto/assets/crypto-book/chapters-simple/blockchain-101.jpg","rating":100,"sections":[{"slug":"what-is-blockchain","title":"What is the Blockchain?","featured_image_id":6412,"status":"published","chapter_id":1,"language":"en","order":1,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-is-blockchain","featured_image":{"id":6412,"uuid":"152ba579-ce8d-488a-9e06-bcd99e976b7d","public_url":"https://assets.bitdegree.org/crypto/storage/media/what-is-blockchain-626fbe085a0cd.o.jpg","path":"crypto/storage/media/what-is-blockchain-626fbe085a0cd.o.jpg","original_path":"crypto/storage/media/what-is-blockchain-626fbe085a0cd.jpg","name":"what-is-blockchain-626fbe085a0cd.o.jpg","original_name":"what-is-blockchain.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"93.86KB"},"youtube_video":null},{"slug":"decentralized-blockchain","title":"Anonymous & Decentralized Blockchains: The Cornerstone of Crypto","featured_image_id":7205,"status":"published","chapter_id":1,"language":"en","order":2,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/decentralized-blockchain","featured_image":{"id":7205,"uuid":"c5d6f6a7-4914-4d6b-9fdd-e94dfb0bae82","public_url":"https://assets.bitdegree.org/crypto/storage/media/decentralized-blockchain-featured-image.o.jpg","path":"crypto/storage/media/decentralized-blockchain-featured-image.o.jpg","original_path":"crypto/storage/media/decentralized-blockchain-featured-image.jpg","name":"decentralized-blockchain-featured-image.o.jpg","original_name":"decentralized-blockchain-featured-image.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"136.00KB"},"youtube_video":null},{"slug":"blockchain-transaction","title":"What is a Blockchain Transaction in Crypto?","featured_image_id":7397,"status":"published","chapter_id":1,"language":"en","order":3,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/blockchain-transaction","featured_image":{"id":7397,"uuid":"e60dff45-4c5d-4b44-a2c1-a27e49f700e7","public_url":"https://assets.bitdegree.org/crypto/storage/media/blockchain-transaction-featured-mage.o.jpg","path":"crypto/storage/media/blockchain-transaction-featured-mage.o.jpg","original_path":"crypto/storage/media/blockchain-transaction-featured-mage.jpg","name":"blockchain-transaction-featured-mage.o.jpg","original_name":"blockchain-transaction-featured-mage.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"85.83KB"},"youtube_video":null},{"slug":"crypto-fees","title":"The Different Types of Crypto Fees Explained","featured_image_id":7442,"status":"published","chapter_id":1,"language":"en","order":4,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/crypto-fees","featured_image":{"id":7442,"uuid":"f554012e-7fe1-4636-9718-81abd3499361","public_url":"https://assets.bitdegree.org/crypto/storage/media/crypto-fees-featured-image.o.jpg","path":"crypto/storage/media/crypto-fees-featured-image.o.jpg","original_path":"crypto/storage/media/crypto-fees-featured-image.jpg","name":"crypto-fees-featured-image.o.jpg","original_name":"crypto-fees-featured-image.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"78.90KB"},"youtube_video":null},{"slug":"what-is-bridging-in-crypto","title":"The Key Notion Behind the Concept of Bridging in Crypto","featured_image_id":7662,"status":"published","chapter_id":1,"language":"en","order":5,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-is-bridging-in-crypto","featured_image":{"id":7662,"uuid":"67564127-d9df-451e-8767-c28930039dc8","public_url":"https://assets.bitdegree.org/crypto/storage/media/what-is-crypto-bridging-featured-image.o.jpg","path":"crypto/storage/media/what-is-crypto-bridging-featured-image.o.jpg","original_path":"crypto/storage/media/what-is-crypto-bridging-featured-image.jpg","name":"what-is-crypto-bridging-featured-image.o.jpg","original_name":"what-is-crypto-bridging-featured-image.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"106.21KB"},"youtube_video":null},{"slug":"types-of-blockchains","title":"Different Types of Blockchains: What to Look Out For?","featured_image_id":7272,"status":"published","chapter_id":1,"language":"en","order":6,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/types-of-blockchains","featured_image":{"id":7272,"uuid":"6ad01272-67ac-4719-8e88-7f01752a0628","public_url":"https://assets.bitdegree.org/crypto/storage/media/types-of-blockchains-featured-image.o.jpg","path":"crypto/storage/media/types-of-blockchains-featured-image.o.jpg","original_path":"crypto/storage/media/types-of-blockchains-featured-image.jpg","name":"types-of-blockchains-featured-image.o.jpg","original_name":"types-of-blockchains-featured-image.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"110.34KB"},"youtube_video":null}]},{"id":2,"title":"Cryptocurrencies","slug":"cryptocurrencies","updated":null,"chapter":"https://assets.bitdegree.org/crypto/assets/crypto-book/chapters/learn-cryptocurrencies.jpg","chapter_simple":"https://assets.bitdegree.org/crypto/assets/crypto-book/chapters-simple/cryptocurrencies-101.jpg","rating":100,"sections":[{"slug":"what-is-a-cryptocurrency","title":"What is a Cryptocurrency?","featured_image_id":7751,"status":"published","chapter_id":2,"language":"en","order":1,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-is-a-cryptocurrency","featured_image":{"id":7751,"uuid":"791c4203-70ae-4c68-8a02-bc1769331e86","public_url":"https://assets.bitdegree.org/crypto/storage/media/what-is-cryptocurrency-featured-image.o.jpg","path":"crypto/storage/media/what-is-cryptocurrency-featured-image.o.jpg","original_path":"crypto/storage/media/what-is-cryptocurrency-featured-image.jpg","name":"what-is-cryptocurrency-featured-image.o.jpg","original_name":"what-is-cryptocurrency-featured-image.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"90.10KB"},"youtube_video":null},{"slug":"how-does-cryptocurrency-work","title":"How Does Cryptocurrency Work?","featured_image_id":7901,"status":"published","chapter_id":2,"language":"en","order":2,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/how-does-cryptocurrency-work","featured_image":{"id":7901,"uuid":"8cbcfe71-8bbf-4b46-88b5-3c093730a696","public_url":"https://assets.bitdegree.org/crypto/storage/media/how-does-cryptocurrency-work-featured-image.o.jpg","path":"crypto/storage/media/how-does-cryptocurrency-work-featured-image.o.jpg","original_path":"crypto/storage/media/how-does-cryptocurrency-work-featured-image.jpg","name":"how-does-cryptocurrency-work-featured-image.o.jpg","original_name":"how-does-cryptocurrency-work-featured-image.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"131.98KB"},"youtube_video":null},{"slug":"is-cryptocurrency-a-good-investment","title":"Is Cryptocurrency a Good Investment? The Pros & Cons","featured_image_id":7970,"status":"published","chapter_id":2,"language":"en","order":3,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/is-cryptocurrency-a-good-investment","featured_image":{"id":7970,"uuid":"97ba4b02-cac2-4a9a-97d9-517f29a0ba30","public_url":"https://assets.bitdegree.org/crypto/storage/media/is-cryptocurrency-a-good-investment-featured-image.o.jpg","path":"crypto/storage/media/is-cryptocurrency-a-good-investment-featured-image.o.jpg","original_path":"crypto/storage/media/is-cryptocurrency-a-good-investment-featured-image.jpg","name":"is-cryptocurrency-a-good-investment-featured-image.o.jpg","original_name":"is-cryptocurrency-a-good-investment-featured-image.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"98.62KB"},"youtube_video":null},{"slug":"coin-vs-token","title":"Coin VS Token: How Do They Differ?","featured_image_id":6414,"status":"published","chapter_id":2,"language":"en","order":4,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/coin-vs-token","featured_image":{"id":6414,"uuid":"c272a929-e278-42e8-9f7c-5425cfa42224","public_url":"https://assets.bitdegree.org/crypto/storage/media/coin-vs-token.o.jpg","path":"crypto/storage/media/coin-vs-token.o.jpg","original_path":"crypto/storage/media/coin-vs-token.jpg","name":"coin-vs-token.o.jpg","original_name":"coin-vs-token.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"97.03KB"},"youtube_video":null},{"slug":"what-are-stablecoins","title":"What are Stablecoins, Altcoins & Wrapped Coins?","featured_image_id":8008,"status":"published","chapter_id":2,"language":"en","order":5,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-are-stablecoins","featured_image":{"id":8008,"uuid":"e4bf3c31-531e-4f10-87be-0fa1b4c428c4","public_url":"https://assets.bitdegree.org/crypto/storage/media/what-are-stablecoins-featured-image.o.jpg","path":"crypto/storage/media/what-are-stablecoins-featured-image.o.jpg","original_path":"crypto/storage/media/what-are-stablecoins-featured-image.jpg","name":"what-are-stablecoins-featured-image.o.jpg","original_name":"what-are-stablecoins-featured-image.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"118.95KB"},"youtube_video":null},{"slug":"what-is-a-bitcoin","title":"Bitcoin: the Pioneer of the Crypto World","featured_image_id":8074,"status":"published","chapter_id":2,"language":"en","order":6,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-is-a-bitcoin","featured_image":{"id":8074,"uuid":"46e1226b-b72e-4c63-86f3-00b36865dc24","public_url":"https://assets.bitdegree.org/crypto/storage/media/what-is-a-bitcoin-featured-image.o.jpg","path":"crypto/storage/media/what-is-a-bitcoin-featured-image.o.jpg","original_path":"crypto/storage/media/what-is-a-bitcoin-featured-image.jpg","name":"what-is-a-bitcoin-featured-image.o.jpg","original_name":"what-is-a-bitcoin-featured-image.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"117.78KB"},"youtube_video":null},{"slug":"what-is-ethereum","title":"The Ultimate Blockchain for dApp Creation: Ethereum","featured_image_id":8199,"status":"published","chapter_id":2,"language":"en","order":7,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-is-ethereum","featured_image":{"id":8199,"uuid":"eea421af-8373-441f-98a1-a6ff7e5bf580","public_url":"https://assets.bitdegree.org/crypto/storage/media/what-is-ethereum-featured-image.o.jpg","path":"crypto/storage/media/what-is-ethereum-featured-image.o.jpg","original_path":"crypto/storage/media/what-is-ethereum-featured-image.jpg","name":"what-is-ethereum-featured-image.o.jpg","original_name":"what-is-ethereum-featured-image.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"65.20KB"},"youtube_video":null},{"slug":"what-is-cardano-in-crypto","title":"What is Cardano and What is It Used For?","featured_image_id":6525,"status":"published","chapter_id":2,"language":"en","order":8,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-is-cardano-in-crypto","featured_image":{"id":6525,"uuid":"b567449c-5b31-45c3-a8eb-4640d3b8ff69","public_url":"https://assets.bitdegree.org/crypto/storage/media/what-is-cardano.o.jpg","path":"crypto/storage/media/what-is-cardano.o.jpg","original_path":"crypto/storage/media/what-is-cardano.jpg","name":"what-is-cardano.o.jpg","original_name":"what-is-cardano.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"91.90KB"},"youtube_video":null},{"slug":"what-is-shiba-inu-coin","title":"Shiba Inu: the Dogecoin Killer","featured_image_id":6541,"status":"published","chapter_id":2,"language":"en","order":9,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-is-shiba-inu-coin","featured_image":{"id":6541,"uuid":"c1bbdb54-6c30-4641-afd4-370b9e795091","public_url":"https://assets.bitdegree.org/crypto/storage/media/what-is-shiba-inu-coin.o.jpg","path":"crypto/storage/media/what-is-shiba-inu-coin.o.jpg","original_path":"crypto/storage/media/what-is-shiba-inu-coin.jpg","name":"what-is-shiba-inu-coin.o.jpg","original_name":"what-is-shiba-inu-coin.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"91.35KB"},"youtube_video":null},{"slug":"what-is-solana-in-crypto","title":"Is Solana an Improved Version of Ethereum?","featured_image_id":6497,"status":"published","chapter_id":2,"language":"en","order":10,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-is-solana-in-crypto","featured_image":{"id":6497,"uuid":"6c7c70ad-e117-4520-b0ce-8ef6b3c184de","public_url":"https://assets.bitdegree.org/crypto/storage/media/what-is-solana-in-crypto-6270ec2042765.o.jpg","path":"crypto/storage/media/what-is-solana-in-crypto-6270ec2042765.o.jpg","original_path":"crypto/storage/media/what-is-solana-in-crypto-6270ec2042765.jpg","name":"what-is-solana-in-crypto-6270ec2042765.o.jpg","original_name":"what-is-solana-in-crypto.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"96.08KB"},"youtube_video":null},{"slug":"what-is-polkadot-in-crypto","title":"The Bridge Between Blockchains: Polkadot","featured_image_id":6891,"status":"published","chapter_id":2,"language":"en","order":11,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-is-polkadot-in-crypto","featured_image":{"id":6891,"uuid":"8419c664-891c-434f-8de9-c483cd825616","public_url":"https://assets.bitdegree.org/crypto/storage/media/what-is-polkadot-in-crypto-featured-image.o.jpg","path":"crypto/storage/media/what-is-polkadot-in-crypto-featured-image.o.jpg","original_path":"crypto/storage/media/what-is-polkadot-in-crypto-featured-image.jpg","name":"what-is-polkadot-in-crypto-featured-image.o.jpg","original_name":"what-is-polkadot-in-crypto-featured-image.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"87.09KB"},"youtube_video":null},{"slug":"what-is-polygon-in-crypto","title":"Polygon: the Essential Scaling Solution for Ethereum","featured_image_id":7085,"status":"published","chapter_id":2,"language":"en","order":12,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-is-polygon-in-crypto","featured_image":{"id":7085,"uuid":"3cdbe13d-9f88-4cc9-98a0-0b8515210f94","public_url":"https://assets.bitdegree.org/crypto/storage/media/what-is-polygon-in-crypto-featured-image.o.jpg","path":"crypto/storage/media/what-is-polygon-in-crypto-featured-image.o.jpg","original_path":"crypto/storage/media/what-is-polygon-in-crypto-featured-image.jpg","name":"what-is-polygon-in-crypto-featured-image.o.jpg","original_name":"what-is-polygon-in-crypto-featured-image.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"77.90KB"},"youtube_video":null},{"slug":"practical-use-of-cryptocurrencies","title":"The Practical Use of Crypto","featured_image_id":6631,"status":"published","chapter_id":2,"language":"en","order":13,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/practical-use-of-cryptocurrencies","featured_image":{"id":6631,"uuid":"574ad2ea-9601-4c1c-9cf6-1d8221134076","public_url":"https://assets.bitdegree.org/crypto/storage/media/crypto-practical-use.o.jpg","path":"crypto/storage/media/crypto-practical-use.o.jpg","original_path":"crypto/storage/media/crypto-practical-use.jpg","name":"crypto-practical-use.o.jpg","original_name":"crypto-practical-use.jpg","title":null,"alt":null,"width":1280,"height":720,"disk":"spaces","status":"uploaded","readable_file_size":"96.43KB"},"youtube_video":null}]},{"id":3,"title":"Crypto Exchanges","slug":"crypto-exchanges","updated":null,"chapter":"https://assets.bitdegree.org/crypto/assets/crypto-book/chapters/learn-crypto-exchanges.jpg","chapter_simple":"https://assets.bitdegree.org/crypto/assets/crypto-book/chapters-simple/crypto-exchanges-101.jpg","rating":80,"sections":[{"slug":"how-do-cryptocurrency-exchanges-work","title":"How do Cryptocurrency Exchanges Work?","featured_image_id":8223,"status":"published","chapter_id":3,"language":"en","order":1,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/how-do-cryptocurrency-exchanges-work","featured_image":{"id":8223,"uuid":"fcb588c1-df45-4330-95de-a3aec84c8cdb","public_url":"https://assets.bitdegree.org/crypto/storage/media/how-do-cryptocurrency-exchanges-work-featured-image.o.jpg","path":"crypto/storage/media/how-do-cryptocurrency-exchanges-work-featured-image.o.jpg","original_path":"crypto/storage/media/how-do-cryptocurrency-exchanges-work-featured-image.jpg","name":"how-do-cryptocurrency-exchanges-work-featured-image.o.jpg","original_name":"how-do-cryptocurrency-exchanges-work-featured-image.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"110.40KB"},"youtube_video":null},{"slug":"dex-vs-cex","title":"DEX VS CEX: Two Sides of the Crypto Exchange Industry","featured_image_id":8448,"status":"published","chapter_id":3,"language":"en","order":2,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/dex-vs-cex","featured_image":{"id":8448,"uuid":"7fb54661-e36d-4dd5-bb54-f3e80a869640","public_url":"https://assets.bitdegree.org/crypto/storage/optimized/cex-vs-dex-featured-image.jpg","path":"crypto/storage/optimized/cex-vs-dex-featured-image.jpg","original_path":"crypto/storage/original/cex-vs-dex-featured-image.jpg","name":"cex-vs-dex-featured-image.jpg","original_name":"cex-vs-dex-featured-image.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"33.99KB"},"youtube_video":null},{"slug":"crypto-day-trading","title":"Crypto Day Trading: The Difference Between Buying, Trading, and Swapping","featured_image_id":8449,"status":"published","chapter_id":3,"language":"en","order":3,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/crypto-day-trading","featured_image":{"id":8449,"uuid":"025c58f1-f0ec-46b9-a58c-3fdec43a4f4c","public_url":"https://assets.bitdegree.org/crypto/storage/optimized/crypto-day-trading-featurd-image.jpg","path":"crypto/storage/optimized/crypto-day-trading-featurd-image.jpg","original_path":"crypto/storage/original/crypto-day-trading-featurd-image.jpg","name":"crypto-day-trading-featurd-image.jpg","original_name":"crypto-day-trading-featurd-image.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"36.23KB"},"youtube_video":null},{"slug":"kyc-crypto","title":"KYC & AML: The Key to Complying With Legal Industry Standards","featured_image_id":null,"status":"published","chapter_id":3,"language":"en","order":4,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/kyc-crypto","featured_image":null,"youtube_video":null},{"slug":"how-to-buy-crypto","title":"From Fiat to Crypto: How to Buy Crypto for the First Time","featured_image_id":8748,"status":"published","chapter_id":3,"language":"en","order":5,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/how-to-buy-crypto","featured_image":{"id":8748,"uuid":"fe81c05d-c3da-4d7d-a132-bdb04f1fae9b","public_url":"https://assets.bitdegree.org/crypto/storage/optimized/how-to-buy-crypto-featured-image.jpg","path":"crypto/storage/optimized/how-to-buy-crypto-featured-image.jpg","original_path":"crypto/storage/original/how-to-buy-crypto-featured-image.jpg","name":"how-to-buy-crypto-featured-image.jpg","original_name":"how-to-buy-crypto-featured-image.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"46.15KB"},"youtube_video":null},{"slug":"fiat-to-crypto","title":"Taking Profits: Turning Crypto Into Fiat","featured_image_id":8840,"status":"published","chapter_id":3,"language":"en","order":6,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/fiat-to-crypto","featured_image":{"id":8840,"uuid":"6d0b98da-7eb5-4b1e-bfb1-d95f0938f85c","public_url":"https://assets.bitdegree.org/crypto/storage/optimized/fiat-to-crypto-featured-image.jpg","path":"crypto/storage/optimized/fiat-to-crypto-featured-image.jpg","original_path":"crypto/storage/original/fiat-to-crypto-featured-image.jpg","name":"fiat-to-crypto-featured-image.jpg","original_name":"fiat-to-crypto-featured-image.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"44.02KB"},"youtube_video":null},{"slug":"how-to-use-crypto","title":"You’ve Got Crypto: What Can You Do With It?","featured_image_id":8932,"status":"published","chapter_id":3,"language":"en","order":7,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/how-to-use-crypto","featured_image":{"id":8932,"uuid":"2248685e-3fbf-41a8-80f5-39ea5ce54c4c","public_url":"https://assets.bitdegree.org/crypto/storage/optimized/how-to-use-crypto-featured-image.jpg","path":"crypto/storage/optimized/how-to-use-crypto-featured-image.jpg","original_path":"crypto/storage/original/how-to-use-crypto-featured-image.jpg","name":"how-to-use-crypto-featured-image.jpg","original_name":"how-to-use-crypto-featured-image.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"34.96KB"},"youtube_video":null}]},{"id":4,"title":"Crypto Wallets","slug":"crypto-wallets","updated":false,"chapter":"https://assets.bitdegree.org/crypto/assets/crypto-book/chapters/learn-crypto-wallets.jpg","chapter_simple":"https://assets.bitdegree.org/crypto/assets/crypto-book/chapters-simple/crypto-wallets-101.jpg","rating":80,"sections":[{"slug":"what-is-a-crypto-wallet","title":"What is a Crypto Wallet?","featured_image_id":10090,"status":"published","chapter_id":4,"language":"en","order":1,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-is-a-crypto-wallet","featured_image":{"id":10090,"uuid":"8b3d3575-1a58-449e-8583-34a4b43d1d39","public_url":"https://assets.bitdegree.org/crypto/storage/optimized/what-is-a-crypto-wallet-featured-image.jpg","path":"crypto/storage/optimized/what-is-a-crypto-wallet-featured-image.jpg","original_path":"crypto/storage/original/what-is-a-crypto-wallet-featured-image.jpg","name":"what-is-a-crypto-wallet-featured-image.jpg","original_name":"what-is-a-crypto-wallet-featured-image.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"58.62KB"},"youtube_video":null},{"slug":"hot-wallet-vs-cold-wallet","title":"Hot Wallet VS Cold Wallet: Which One to Pick?","featured_image_id":9000,"status":"published","chapter_id":4,"language":"en","order":2,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/hot-wallet-vs-cold-wallet","featured_image":{"id":9000,"uuid":"bf04c205-f96c-41bf-86f7-a2672133734e","public_url":"https://assets.bitdegree.org/crypto/storage/optimized/hot-wallet-vs-cold-wallet-featured-image.jpg","path":"crypto/storage/optimized/hot-wallet-vs-cold-wallet-featured-image.jpg","original_path":"crypto/storage/original/hot-wallet-vs-cold-wallet-featured-image.jpg","name":"hot-wallet-vs-cold-wallet-featured-image.jpg","original_name":"hot-wallet-vs-cold-wallet-featured-image.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"57.52KB"},"youtube_video":null},{"slug":"non-custodial-wallet","title":"What are Non-Custodial Crypto Wallets?","featured_image_id":7608,"status":"published","chapter_id":4,"language":"en","order":3,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/non-custodial-wallet","featured_image":{"id":7608,"uuid":"cdbc87df-190b-4a52-92ed-674c981bfbb1","public_url":"https://assets.bitdegree.org/crypto/storage/media/non-custodial-wallet-featured-image.o.jpg","path":"crypto/storage/media/non-custodial-wallet-featured-image.o.jpg","original_path":"crypto/storage/media/non-custodial-wallet-featured-image.jpg","name":"non-custodial-wallet-featured-image.o.jpg","original_name":"non-custodial-wallet-featured-image.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"119.46KB"},"youtube_video":null},{"slug":"what-is-metamask","title":"Metamask: The Leading Non-Custodial Wallet","featured_image_id":6436,"status":"published","chapter_id":4,"language":"en","order":4,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-is-metamask","featured_image":{"id":6436,"uuid":"07afcb69-dec3-477f-8b1c-a78a2f7c8892","public_url":"https://assets.bitdegree.org/crypto/storage/media/what-is-metamask-626fdf70526cf.o.jpg","path":"crypto/storage/media/what-is-metamask-626fdf70526cf.o.jpg","original_path":"crypto/storage/media/what-is-metamask-626fdf70526cf.jpg","name":"what-is-metamask-626fdf70526cf.o.jpg","original_name":"what-is-metamask.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"87.47KB"},"youtube_video":null},{"slug":"how-safe-is-cryptocurrency","title":"The Key Crypto Wallet Safety Practices: How Safe Can Crypto Be?","featured_image_id":9338,"status":"published","chapter_id":4,"language":"en","order":37,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/how-safe-is-cryptocurrency","featured_image":{"id":9338,"uuid":"f5b1da8e-dee9-43ea-b6d7-f2f057a71090","public_url":"https://assets.bitdegree.org/crypto/storage/optimized/how-safe-is-cryptocurrency-featured-image.jpg","path":"crypto/storage/optimized/how-safe-is-cryptocurrency-featured-image.jpg","original_path":"crypto/storage/original/how-safe-is-cryptocurrency-featured-image.jpg","name":"how-safe-is-cryptocurrency-featured-image.jpg","original_name":"how-safe-is-cryptocurrency-featured-image.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"64.98KB"},"youtube_video":null}]},{"id":5,"title":"NFTs","slug":"nfts","updated":null,"chapter":"https://assets.bitdegree.org/crypto/assets/crypto-book/chapters/learn-nfts.jpg","chapter_simple":"https://assets.bitdegree.org/crypto/assets/crypto-book/chapters-simple/nfts-101.jpg","rating":100,"sections":[{"slug":"what-are-nfts","title":"What are Non-Fungible Tokens (NFTs)?","featured_image_id":6396,"status":"published","chapter_id":5,"language":"en","order":1,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-are-nfts","featured_image":{"id":6396,"uuid":"8b724ac3-532b-441e-bf9c-58a6af704a7f","public_url":"https://assets.bitdegree.org/crypto/storage/media/what-are-nfts.o.jpg","path":"crypto/storage/media/what-are-nfts.o.jpg","original_path":"crypto/storage/media/what-are-nfts.jpg","name":"what-are-nfts.o.jpg","original_name":"what-are-nfts.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"101.34KB"},"youtube_video":null},{"slug":"how-to-trade-nfts","title":"NFT Trading: The Ins and Outs","featured_image_id":9454,"status":"published","chapter_id":5,"language":"en","order":2,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/how-to-trade-nfts","featured_image":{"id":9454,"uuid":"d5997c2e-a079-4b01-8bf5-4d05a21b091e","public_url":"https://assets.bitdegree.org/crypto/storage/optimized/how-to-trade-nfts-featured-image.jpg","path":"crypto/storage/optimized/how-to-trade-nfts-featured-image.jpg","original_path":"crypto/storage/original/how-to-trade-nfts-featured-image.jpg","name":"how-to-trade-nfts-featured-image.jpg","original_name":"how-to-trade-nfts-featured-image.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"39.43KB"},"youtube_video":null},{"slug":"buying-nft","title":"Tips and Tricks of Choosing the Right NFTs","featured_image_id":9674,"status":"published","chapter_id":5,"language":"en","order":3,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/buying-nft","featured_image":{"id":9674,"uuid":"ae025989-e689-4ece-b472-3434080810fb","public_url":"https://assets.bitdegree.org/crypto/storage/optimized/buying-nft-featured-image.jpg","path":"crypto/storage/optimized/buying-nft-featured-image.jpg","original_path":"crypto/storage/original/buying-nft-featured-image.jpg","name":"buying-nft-featured-image.jpg","original_name":"buying-nft-featured-image.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"48.93KB"},"youtube_video":null},{"slug":"how-to-store-nft","title":"How to Store NFTs: Best Practices","featured_image_id":9873,"status":"published","chapter_id":5,"language":"en","order":4,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/how-to-store-nft","featured_image":{"id":9873,"uuid":"23f1f793-d48c-4007-9d1b-9dea00fef356","public_url":"https://assets.bitdegree.org/crypto/storage/optimized/how-to-store-nft-featured-image.jpg","path":"crypto/storage/optimized/how-to-store-nft-featured-image.jpg","original_path":"crypto/storage/original/how-to-store-nft-featured-image.jpg","name":"how-to-store-nft-featured-image.jpg","original_name":"how-to-store-nft-featured-image.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"44.13KB"},"youtube_video":null},{"slug":"how-to-create-an-nft","title":"How to Create Your Own NFTs?","featured_image_id":10971,"status":"published","chapter_id":5,"language":"en","order":5,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/how-to-create-an-nft","featured_image":{"id":10971,"uuid":"264558fd-a505-4b94-9844-a73588ead5f2","public_url":"https://assets.bitdegree.org/crypto/storage/optimized/how-to-create-an-nft-featured-image.jpg","path":"crypto/storage/optimized/how-to-create-an-nft-featured-image.jpg","original_path":"crypto/storage/original/how-to-create-an-nft-featured-image.jpg","name":"how-to-create-an-nft-featured-image.jpg","original_name":"how-to-create-an-nft-featured-image.jpg","title":null,"alt":null,"width":1024,"height":576,"disk":"spaces","status":"uploaded","readable_file_size":"50.40KB"},"youtube_video":null},{"slug":"how-to-make-passive-money-with-nft","title":"Making Passive Money with NFTs","featured_image_id":6524,"status":"published","chapter_id":5,"language":"en","order":6,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/how-to-make-passive-money-with-nft","featured_image":{"id":6524,"uuid":"b32da80c-c3a6-4042-8a35-032e843e93c2","public_url":"https://assets.bitdegree.org/crypto/storage/media/how-to-make-passive-money-with-nfts.o.jpg","path":"crypto/storage/media/how-to-make-passive-money-with-nfts.o.jpg","original_path":"crypto/storage/media/how-to-make-passive-money-with-nfts.jpg","name":"how-to-make-passive-money-with-nfts.o.jpg","original_name":"how-to-make-passive-money-with-nfts.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"109.46KB"},"youtube_video":null}]},{"id":6,"title":"dApps & Defi","slug":"dapps-and-defi","updated":true,"chapter":"https://assets.bitdegree.org/crypto/assets/crypto-book/chapters/learn-dapps.jpg","chapter_simple":"https://assets.bitdegree.org/crypto/assets/crypto-book/chapters-simple/dapps-defi-101.jpg","rating":80,"sections":[{"slug":"what-is-defi","title":"What is Decentralized Finance (DeFi)?","featured_image_id":6482,"status":"published","chapter_id":6,"language":"en","order":1,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-is-defi","featured_image":{"id":6482,"uuid":"fe6a90e2-dd9b-4fde-a73d-4bd54f28333a","public_url":"https://assets.bitdegree.org/crypto/storage/media/what-is-defi-6270d5ef7b36a.o.jpg","path":"crypto/storage/media/what-is-defi-6270d5ef7b36a.o.jpg","original_path":"crypto/storage/media/what-is-defi-6270d5ef7b36a.jpg","name":"what-is-defi-6270d5ef7b36a.o.jpg","original_name":"what-is-defi.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"100.87KB"},"youtube_video":null},{"slug":"what-is-defi-2-0","title":"DeFi 2.0: The New Version of Decentralized Finance","featured_image_id":null,"status":"published","chapter_id":6,"language":"en","order":2,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-is-defi-2-0","featured_image":null,"youtube_video":null},{"slug":"what-are-dapps-in-crypto","title":"What Are dApps and How Do They Work?","featured_image_id":6512,"status":"published","chapter_id":6,"language":"en","order":3,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-are-dapps-in-crypto","featured_image":{"id":6512,"uuid":"5b01af79-3366-4b9a-bbc4-a1e6511c23c2","public_url":"https://assets.bitdegree.org/crypto/storage/media/what-are-dapps-in-crypto.o.jpg","path":"crypto/storage/media/what-are-dapps-in-crypto.o.jpg","original_path":"crypto/storage/media/what-are-dapps-in-crypto.jpg","name":"what-are-dapps-in-crypto.o.jpg","original_name":"what-are-dapps-in-crypto.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"143.97KB"},"youtube_video":null},{"slug":"defi-dapps","title":"Picking the Right dApps: Dos and Don'ts","featured_image_id":11150,"status":"published","chapter_id":6,"language":"en","order":4,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/defi-dapps","featured_image":{"id":11150,"uuid":"bead04d0-c7ab-484a-9a26-c279078cdafa","public_url":"https://assets.bitdegree.org/crypto/storage/optimized/defi-dapps-featured-image.jpg","path":"crypto/storage/optimized/defi-dapps-featured-image.jpg","original_path":"crypto/storage/original/defi-dapps-featured-image.jpg","name":"defi-dapps-featured-image.jpg","original_name":"defi-dapps-featured-image.jpg","title":null,"alt":null,"width":1024,"height":576,"disk":"spaces","status":"uploaded","readable_file_size":"64.91KB"},"youtube_video":null},{"slug":"what-is-web-3-0","title":"Web 3.0: The Future of the Internet","featured_image_id":6395,"status":"published","chapter_id":6,"language":"en","order":5,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-is-web-3-0","featured_image":{"id":6395,"uuid":"1ba8aae1-7977-415b-9e73-f68ad1219405","public_url":"https://assets.bitdegree.org/crypto/storage/media/what-is-web3.o.jpg","path":"crypto/storage/media/what-is-web3.o.jpg","original_path":"crypto/storage/media/what-is-web3.jpg","name":"what-is-web3.o.jpg","original_name":"what-is-web3.jpg","title":null,"alt":null,"width":768,"height":476,"disk":"spaces","status":"uploaded","readable_file_size":"103.80KB"},"youtube_video":null},{"slug":"what-are-smart-contracts","title":"What is the Core Purpose of Smart Contracts?","featured_image_id":6413,"status":"published","chapter_id":6,"language":"en","order":6,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-are-smart-contracts","featured_image":{"id":6413,"uuid":"ec3a5a7b-d00e-4273-bfcf-60fa52a33851","public_url":"https://assets.bitdegree.org/crypto/storage/media/what-are-smart-contracts.o.jpg","path":"crypto/storage/media/what-are-smart-contracts.o.jpg","original_path":"crypto/storage/media/what-are-smart-contracts.jpg","name":"what-are-smart-contracts.o.jpg","original_name":"what-are-smart-contracts.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"103.94KB"},"youtube_video":null},{"slug":"what-is-a-dao-in-crypto","title":"The Notion of a Decentralized Autonomous Ogranization (DAO)","featured_image_id":6502,"status":"published","chapter_id":6,"language":"en","order":7,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-is-a-dao-in-crypto","featured_image":{"id":6502,"uuid":"e58df8a9-b000-4267-91f3-bd0d697c8984","public_url":"https://assets.bitdegree.org/crypto/storage/media/what-is-a-dao-in-crypto.o.jpg","path":"crypto/storage/media/what-is-a-dao-in-crypto.o.jpg","original_path":"crypto/storage/media/what-is-a-dao-in-crypto.jpg","name":"what-is-a-dao-in-crypto.o.jpg","original_name":"what-is-a-dao-in-crypto.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"79.33KB"},"youtube_video":null},{"slug":"what-is-staking-in-crypto","title":"What is the Goal of Staking Crypto Assets?","featured_image_id":6498,"status":"published","chapter_id":6,"language":"en","order":8,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-is-staking-in-crypto","featured_image":{"id":6498,"uuid":"b76303ce-48b0-4c97-812d-cb2589859f47","public_url":"https://assets.bitdegree.org/crypto/storage/media/what-is-staking.o.jpg","path":"crypto/storage/media/what-is-staking.o.jpg","original_path":"crypto/storage/media/what-is-staking.jpg","name":"what-is-staking.o.jpg","original_name":"what-is-staking.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"258.60KB"},"youtube_video":null},{"slug":"what-is-liquidity-pool-in-crypto","title":"What is a Liquidity Pool and How Does It Work?","featured_image_id":6488,"status":"published","chapter_id":6,"language":"en","order":9,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-is-liquidity-pool-in-crypto","featured_image":{"id":6488,"uuid":"2fc1d0cc-8577-43c0-bc7d-f00a6291caea","public_url":"https://assets.bitdegree.org/crypto/storage/media/what-is-liquidity-pool-6270dd6a4c693.o.jpg","path":"crypto/storage/media/what-is-liquidity-pool-6270dd6a4c693.o.jpg","original_path":"crypto/storage/media/what-is-liquidity-pool-6270dd6a4c693.jpg","name":"what-is-liquidity-pool-6270dd6a4c693.o.jpg","original_name":"what-is-liquidity-pool.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"108.86KB"},"youtube_video":null},{"slug":"what-is-automated-market-maker","title":"Automated Market Maker: the Cornerstone of the Decentralized Crypto Exchange Industry","featured_image_id":null,"status":"published","chapter_id":6,"language":"en","order":10,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-is-automated-market-maker","featured_image":null,"youtube_video":null},{"slug":"what-is-yield-farming-in-crypto","title":"The Main Yield Farming Techniques","featured_image_id":6528,"status":"published","chapter_id":6,"language":"en","order":11,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-is-yield-farming-in-crypto","featured_image":{"id":6528,"uuid":"bc531000-9b52-4db5-93fc-80d3317a660d","public_url":"https://assets.bitdegree.org/crypto/storage/media/what-is-yield-farming-in-crypto.o.jpg","path":"crypto/storage/media/what-is-yield-farming-in-crypto.o.jpg","original_path":"crypto/storage/media/what-is-yield-farming-in-crypto.jpg","name":"what-is-yield-farming-in-crypto.o.jpg","original_name":"what-is-yield-farming-in-crypto.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"184.57KB"},"youtube_video":null},{"slug":"what-is-an-oracle-in-crypto","title":"Crypto Oracles: The Link Between Blockchain and Outside World Data","featured_image_id":10249,"status":"published","chapter_id":6,"language":"en","order":12,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-is-an-oracle-in-crypto","featured_image":{"id":10249,"uuid":"035b2dde-8494-4742-9b7e-4b442aff7955","public_url":"https://assets.bitdegree.org/crypto/storage/optimized/what-is-an-oracle-in-crypto-featured-image.jpg","path":"crypto/storage/optimized/what-is-an-oracle-in-crypto-featured-image.jpg","original_path":"crypto/storage/original/what-is-an-oracle-in-crypto-featured-image.jpg","name":"what-is-an-oracle-in-crypto-featured-image.jpg","original_name":"what-is-an-oracle-in-crypto-featured-image.jpg","title":null,"alt":null,"width":1024,"height":576,"disk":"spaces","status":"uploaded","readable_file_size":"53.26KB"},"youtube_video":null},{"slug":"crypto-gambling","title":"The Peculiarities of Decentralized Crypto Gambling","featured_image_id":9901,"status":"published","chapter_id":6,"language":"en","order":13,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/crypto-gambling","featured_image":{"id":9901,"uuid":"60ea4f3a-9576-4004-aa96-619dc96e4319","public_url":"https://assets.bitdegree.org/crypto/storage/optimized/crypto-gambling-featured-image.jpg","path":"crypto/storage/optimized/crypto-gambling-featured-image.jpg","original_path":"crypto/storage/original/crypto-gambling-featured-image.jpg","name":"crypto-gambling-featured-image.jpg","original_name":"crypto-gambling-featured-image.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"61.02KB"},"youtube_video":null},{"slug":"what-is-the-metaverse","title":"Metaverse: A New Perception of Reality","featured_image_id":6411,"status":"published","chapter_id":6,"language":"en","order":14,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-is-the-metaverse","featured_image":{"id":6411,"uuid":"fad79626-bbf1-4fc0-9e99-bde5597c1bc7","public_url":"https://assets.bitdegree.org/crypto/storage/media/what-is-metaverse.o.jpg","path":"crypto/storage/media/what-is-metaverse.o.jpg","original_path":"crypto/storage/media/what-is-metaverse.jpg","name":"what-is-metaverse.o.jpg","original_name":"what-is-metaverse.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"88.15KB"},"youtube_video":null}]},{"id":7,"title":"Trading & Investing","slug":"trading-and-investing","updated":null,"chapter":"https://assets.bitdegree.org/crypto/assets/crypto-book/chapters/learn-crypto-trading.jpg","chapter_simple":"https://assets.bitdegree.org/crypto/assets/crypto-book/chapters-simple/crypto-trading-101.jpg","rating":80,"sections":[{"slug":"where-to-trade-crypto","title":"Where Can You Trade Cryptocurrencies?","featured_image_id":10342,"status":"published","chapter_id":7,"language":"en","order":1,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/where-to-trade-crypto","featured_image":{"id":10342,"uuid":"0bd8d78a-9423-48ee-9161-34dc1872b97c","public_url":"https://assets.bitdegree.org/crypto/storage/optimized/where-to-trade-crypto-featured-image.jpg","path":"crypto/storage/optimized/where-to-trade-crypto-featured-image.jpg","original_path":"crypto/storage/original/where-to-trade-crypto-featured-image.jpg","name":"where-to-trade-crypto-featured-image.jpg","original_name":"where-to-trade-crypto-featured-image.jpg","title":null,"alt":null,"width":1024,"height":576,"disk":"spaces","status":"uploaded","readable_file_size":"85.96KB"},"youtube_video":null},{"slug":"how-to-invest-in-crypto","title":"Investing in Crypto: What Investing Options Do You Have?","featured_image_id":10729,"status":"published","chapter_id":7,"language":"en","order":2,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/how-to-invest-in-crypto","featured_image":{"id":10729,"uuid":"3439a1db-9892-404a-b4b6-a1db5a34bca4","public_url":"https://assets.bitdegree.org/crypto/storage/optimized/how-to-invest-in-crypto-featured-image.jpg","path":"crypto/storage/optimized/how-to-invest-in-crypto-featured-image.jpg","original_path":"crypto/storage/original/how-to-invest-in-crypto-featured-image.jpg","name":"how-to-invest-in-crypto-featured-image.jpg","original_name":"how-to-invest-in-crypto-featured-image.jpg","title":null,"alt":null,"width":1024,"height":576,"disk":"spaces","status":"uploaded","readable_file_size":"75.22KB"},"youtube_video":null},{"slug":"ico-vs-ido","title":"ICO vs IDO vs IEO: Which One is the One?","featured_image_id":11310,"status":"published","chapter_id":7,"language":"en","order":3,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/ico-vs-ido","featured_image":{"id":11310,"uuid":"315e8a2b-93a1-4870-be48-a2a09d801663","public_url":"https://assets.bitdegree.org/crypto/storage/optimized/ico-vs-ido-featured-image.jpg","path":"crypto/storage/optimized/ico-vs-ido-featured-image.jpg","original_path":"crypto/storage/original/ico-vs-ido-featured-image.jpg","name":"ico-vs-ido-featured-image.jpg","original_name":"ico-vs-ido-featured-image.jpg","title":null,"alt":null,"width":1024,"height":576,"disk":"spaces","status":"uploaded","readable_file_size":"64.39KB"},"youtube_video":null},{"slug":"what-is-an-airdrop","title":"What are Crypto Airdrops and How to Get Them?","featured_image_id":11359,"status":"published","chapter_id":7,"language":"en","order":4,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-is-an-airdrop","featured_image":{"id":11359,"uuid":"7b43c968-1275-4d3e-acb1-1707a43a4014","public_url":"https://assets.bitdegree.org/crypto/storage/optimized/what-is-an-airdrop-featured-image.jpg","path":"crypto/storage/optimized/what-is-an-airdrop-featured-image.jpg","original_path":"crypto/storage/original/what-is-an-airdrop-featured-image.jpg","name":"what-is-an-airdrop-featured-image.jpg","original_name":"what-is-an-airdrop-featured-image.jpg","title":null,"alt":null,"width":1024,"height":576,"disk":"spaces","status":"uploaded","readable_file_size":"66.05KB"},"youtube_video":null},{"slug":"how-to-get-free-crypto","title":"How to Get Free Crypto Assets?","featured_image_id":6542,"status":"published","chapter_id":7,"language":"en","order":5,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/how-to-get-free-crypto","featured_image":{"id":6542,"uuid":"4fceb9ab-391e-4ef9-b00d-c871a49878a3","public_url":"https://assets.bitdegree.org/crypto/storage/media/how-to-get-free-crypto.o.jpg","path":"crypto/storage/media/how-to-get-free-crypto.o.jpg","original_path":"crypto/storage/media/how-to-get-free-crypto.jpg","name":"how-to-get-free-crypto.o.jpg","original_name":"how-to-get-free-crypto.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"93.93KB"},"youtube_video":null},{"slug":"how-to-arbitrage-crypto","title":"What is Crypto Arbitrage: The Main Principles","featured_image_id":null,"status":"published","chapter_id":7,"language":"en","order":6,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/how-to-arbitrage-crypto","featured_image":null,"youtube_video":null},{"slug":"what-is-fud","title":"What is FUD: How to Use It to Your Advantage While Investing in Crypto?","featured_image_id":11394,"status":"published","chapter_id":7,"language":"en","order":7,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-is-fud","featured_image":{"id":11394,"uuid":"defd32c5-d3e1-4e66-9f58-e2ee316bad3a","public_url":"https://assets.bitdegree.org/crypto/storage/optimized/what-is-fud-featured-image.jpg","path":"crypto/storage/optimized/what-is-fud-featured-image.jpg","original_path":"crypto/storage/original/what-is-fud-featured-image.jpg","name":"what-is-fud-featured-image.jpg","original_name":"what-is-fud-featured-image.jpg","title":null,"alt":null,"width":1024,"height":576,"disk":"spaces","status":"uploaded","readable_file_size":"65.30KB"},"youtube_video":null},{"slug":"investing-in-cryptocurrency","title":"Investing in Cryptocurrency: How to Manage Your Risks?","featured_image_id":null,"status":"published","chapter_id":7,"language":"en","order":8,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/investing-in-cryptocurrency","featured_image":null,"youtube_video":null},{"slug":"what-is-a-rug-pull-in-crypto","title":"What is a Rug Pull in Crypto?","featured_image_id":6532,"status":"published","chapter_id":7,"language":"en","order":9,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-is-a-rug-pull-in-crypto","featured_image":{"id":6532,"uuid":"be8043fb-078c-4487-9af9-d2d9c2b574ea","public_url":"https://assets.bitdegree.org/crypto/storage/media/what-is-a-rug-pull-in-crypto.o.jpg","path":"crypto/storage/media/what-is-a-rug-pull-in-crypto.o.jpg","original_path":"crypto/storage/media/what-is-a-rug-pull-in-crypto.jpg","name":"what-is-a-rug-pull-in-crypto.o.jpg","original_name":"what-is-a-rug-pull-in-crypto.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"92.28KB"},"youtube_video":null},{"slug":"how-to-avoid-rug-pulls-in-crypto","title":"How to Spot and Avoid Rug Pulls?","featured_image_id":6555,"status":"published","chapter_id":7,"language":"en","order":10,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/how-to-avoid-rug-pulls-in-crypto","featured_image":{"id":6555,"uuid":"80cbed9d-3b4b-45d9-9a85-d2d8108c0f32","public_url":"https://assets.bitdegree.org/crypto/storage/media/how-to-avoid-rug-pulls.o.jpg","path":"crypto/storage/media/how-to-avoid-rug-pulls.o.jpg","original_path":"crypto/storage/media/how-to-avoid-rug-pulls.jpg","name":"how-to-avoid-rug-pulls.o.jpg","original_name":"how-to-avoid-rug-pulls.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"111.99KB"},"youtube_video":null},{"slug":"how-to-avoid-crypto-taxes","title":"The Key Legal Techniques of Avoiding Crypto Taxes","featured_image_id":6526,"status":"published","chapter_id":7,"language":"en","order":11,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/how-to-avoid-crypto-taxes","featured_image":{"id":6526,"uuid":"1e44162c-ef1d-4010-81b4-9e8d1809aedf","public_url":"https://assets.bitdegree.org/crypto/storage/media/how-to-avoid-crypto-taxes.o.jpg","path":"crypto/storage/media/how-to-avoid-crypto-taxes.o.jpg","original_path":"crypto/storage/media/how-to-avoid-crypto-taxes.jpg","name":"how-to-avoid-crypto-taxes.o.jpg","original_name":"how-to-avoid-crypto-taxes.jpg","title":null,"alt":null,"width":768,"height":478,"disk":"spaces","status":"uploaded","readable_file_size":"99.10KB"},"youtube_video":null}]},{"id":8,"title":"Crypto Analysis","slug":"crypto-analysis","updated":null,"chapter":"https://assets.bitdegree.org/crypto/assets/crypto-book/chapters/learn-crypto-analysis.jpg","chapter_simple":"https://assets.bitdegree.org/crypto/assets/crypto-book/chapters-simple/crypto-analysis-101.jpg","rating":100,"sections":[{"slug":"what-is-bullish-and-bearish","title":"Bearish and Bullish Markets: Do They Matter?","featured_image_id":null,"status":"published","chapter_id":8,"language":"en","order":1,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-is-bullish-and-bearish","featured_image":null,"youtube_video":null},{"slug":"best-technical-analysis-indicators-for-crypto","title":"5 Best Crypto Technical Analysis Indicators You Must Know About","featured_image_id":null,"status":"published","chapter_id":8,"language":"en","order":2,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/best-technical-analysis-indicators-for-crypto","featured_image":null,"youtube_video":null},{"slug":"what-is-candlesticks","title":"Technical Analysis: What are Candlesticks, Trendlines, and Patterns?","featured_image_id":null,"status":"published","chapter_id":8,"language":"en","order":3,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/what-is-candlesticks","featured_image":null,"youtube_video":null},{"slug":"how-to-track-new-crypto-coins","title":"Crypto Tracking: How to Track Your Favorite Coins & Tokens?","featured_image_id":null,"status":"published","chapter_id":8,"language":"en","order":4,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/how-to-track-new-crypto-coins","featured_image":null,"youtube_video":null},{"slug":"how-to-research-crypto","title":"Crypto Research Fundamentals & Social Signals: Your Daily Trading Strategy","featured_image_id":null,"status":"published","chapter_id":8,"language":"en","order":5,"modified_content":null,"preview_url":"https://www.bitdegree.org/crypto/learn/how-to-research-crypto","featured_image":null,"youtube_video":null}]},{"id":9,"title":"Mining","slug":"mining","updated":false,"chapter":"https://assets.bitdegree.org/crypto/assets/crypto-book/chapters/learn-crypto-mining.jpg","chapter_simple":"https://assets.bitdegree.org/crypto/assets/crypto-book/chapters-simple/crypto-mining-101.jpg","rating":80,"sections":[]},{"id":10,"title":"Crypto Terms","updated":false,"chapter":"https://assets.bitdegree.org/crypto/assets/crypto-book/chapters/crypto-101-glossary.jpg","chapter_simple":"https://assets.bitdegree.org/crypto/assets/crypto-book/chapters-simple/crypto-glossary-101.jpg","rating":100,"sections":["A","B","C","D","E","F","G","H","I","J","K","L","M","N","O","P","Q","R","S","T","U","V","W","X","Y","Z"]}],"nextSection":{"id":397,"original_id":null,"author_id":41,"translator_id":null,"title":"What is Hard Fork Combinator?","slug":"what-is-hard-fork-combinator","section":"H","keyword":"Hard Fork Combinator","status":"published","definition":"a tool used to combine protocols on the Cardano blockchain if a hard fork has occurred.","content":"<p>A <strong>Hard Fork Combinator</strong> is a tool used in the <a href=https://www.bitdegree.org/"https://en.wikipedia.org/wiki/Cardano_(blockchain_platform)/" target=\"_blank\" rel=\"nofollow noindex noopener\"><strong>Cardano</strong></a>&nbsp;ecosystem to combine protocols after a <a href=https://www.bitdegree.org/"/crypto/learn/crypto-terms/what-is-hard-fork-blockchain/">hard fork</strong></a> event.</p>\n<p>A hard fork splits one <a href=https://www.bitdegree.org/"/crypto/learn/crypto-terms/what-is-blockchain/">blockchain into two distinguishable protocols which run parallel to each other. The new blockchain branch loses the history of the prior blockchain. A hard fork occurs when new upgrades are implemented into the blockchain. It can modify some of the protocol parameters.</p>\n<p>Hard forks may also occur <strong>on the live blockchain</strong>, which can compromise the integrity of the network. In 2017, a hard fork occurred on the <a href=https://www.bitdegree.org/"https://www.bitdegree.org/crypto/buy-bitcoin-btc/">Bitcoin blockchain</strong></a>, leading to the <strong>chain split</strong>. The event had a significant impact on the interests of Bitcoin investors and caused the formation of Bitcoin Cash (BCH).</p>\n<p>Hard forks often cause downtime in the blockchain ecosystem which can negatively impact the user experience and disrupt any <strong>ongoing</strong> transactions. If a hard fork occurs, the <a href=https://www.bitdegree.org/"/crypto/learn/crypto-terms/what-is-node/">network nodes</strong></a> are unable to update to the newly set parameters and <a href=https://www.bitdegree.org/"/crypto/learn/crypto-terms/what-is-block-header/">block headers</strong></strong></a> simultaneously, without experiencing system interruptions. The blockchain then has to be taken into downtime.</p>\n<p>Although a hard fork may occur on any blockchain, <a href=https://www.bitdegree.org/"/crypto/learn/crypto-terms/what-is-input-output-hong-kong-iohk/">IOHK developed the hard fork combinator as a solution specifically for the <strong>Cardano ecosystem</strong>. The hard fork combinator merges both the pre and post-upgrade protocols together to eliminate the possible interruption or restart issues.</p>\n<p>With the hard fork combinator, several protocols can appear as a single <a href=https://www.bitdegree.org/"/crypto/learn/crypto-terms/what-is-ledger/">ledger. This <strong>prevents the network nodes from having to update</strong> to the new blockchain simultaneously.</p>\n<p>In July 2020, Cardano received upgrades, moving from the wallet-only Byron protocols to proof-of-stake-supported Shelley protocols. During the upgrade, the utility of the blockchain was altered by the hard fork.</p>\n<p>This was a <strong>risky procedure</strong>, as Cardano contained over 1 million <a href=https://www.bitdegree.org/"/crypto/learn/crypto-terms/what-is-wallet/">wallets at the time. Any issues with the hard fork execution could have been detrimental to the Cardano ecosystem as a whole.</p>\n<p>The <strong>Byron-to-Shelley transition was successfully completed</strong> on 29 July 2020, at 21:45 UTC. Users received notice about the ongoing upgrade. However, the use of the Cardano function was not restricted and the hard fork processes were completed in the background. This allowed the network nodes to transition between protocols sequentially.</p>\n<p>Thanks to the <strong>hard fork combinator</strong>, the Cardano blockchain has been able to maintain both Byron and Shelley blocks. The tool will be implemented in future upgrades to support the transitional process.</p>","level":"medium","meta_title":"What is Hard Fork Combinator? Definition & Meaning | Crypto Wiki","meta_description":"Hard Fork Combinator meaning: Hard Fork Combinator - a tool used to combine protocols on the Cardano blockchain if a hard fork has occurred.","meta_keywords":null,"language":"en","created_at":"2022-03-17T07:58:05.000000Z","updated_at":"2022-05-13T14:32:23.000000Z","preview_url":"https://www.bitdegree.org/crypto/learn/crypto-terms/what-is-hard-fork-combinator"},"prevSection":{"id":394,"original_id":null,"author_id":43,"translator_id":null,"title":"What is Hidden Cap?","slug":"what-is-hidden-cap","section":"H","keyword":"Hidden Cap","status":"published","definition":"is a secret limit put on a certain amount of money that a team can receive from investors during an initial coin offering (ICO).","content":"<p>In essence, a <strong>hidden cap</strong> is a <strong>secret</strong> <strong>limit</strong> put on an <strong>amount of money</strong> by a team to <strong>accept</strong> <strong>from investors</strong>. This happens during an <a href=https://www.bitdegree.org/"/crypto/learn/crypto-terms/what-is-initial-coin-offering-ico/">initial coin offering (ICO)</strong></a>.</p>\n<p>Its goal is to provide <strong>equal opportunity to all investors</strong>. A hidden cap does this by allowing small investors to put in money while keeping large investors at bay so they&rsquo;re not able to get a clear understanding of the total cap.&nbsp;</p>","level":"easy","meta_title":"What is Hidden Cap? Definition & Meaning | Crypto Wiki","meta_description":"Hidden Cap meaning: Hidden Cap - is a secret limit put on a certain amount of money that a team can receive from investors during an initial coin offering (ICO).","meta_keywords":null,"language":"en","created_at":"2022-03-16T15:28:26.000000Z","updated_at":"2022-05-13T14:32:23.000000Z","preview_url":"https://www.bitdegree.org/crypto/learn/crypto-terms/what-is-hidden-cap"},"currentChapter":"H","currentSection":"what-is-hacking","chapterTitle":"H","readingLevel":"hard"},"url":"/crypto/learn/crypto-terms/what-is-hacking","version":"cdd198d50cbe5c9c21c9329d7c096ffc"}" class="container-fluid d-flex crypto-book p-0">
Crypto Terms: Letter H

What is Hacking?

Hacking MEANING:
Hacking - a malicious process of manipulating another computing device to exploit it.
Hard
4 minutes

Let's find out Hacking meaning, definition in crypto, what is Hacking, and all other detailed facts.

Hacking is a process during which computational devices are manipulated or compromised to exploit the gaps in their systems.

Hacking Types

There are many different types of hacking done with malicious intent. It can be grounded for ideological reasons or personal gain. Hackers may use different strategies and technologies to achieve their goals.

Brute Force Attack

A brute force attack is a method of trying to crack a password or any encrypted information via automated guessing. Hackers employ bots that attempt to guess as many combinations of passwords as possible.

The simpler the password is, the shorter the brute force attack lasts. Short passwords that contain only letters are considered weak, and it is recommended to add more characters to reinforce their security. Long passwords containing both alphanumerics and special symbols are much more robust and sometimes may take millions of years to crack.

Cryptomining malware

Cryptomining malware is a relatively new method of hacking. If a user’s computer is infected with this type of malware, it unwillingly becomes part of a crypto mining network. This can disrupt processes, cause internet speeds to slow down, and may lead to the hardware deteriorating faster.

Cryptomining malware can be caught by downloading infected files or visiting suspicious websites. The process is also known as cryptojacking.

Distributed Denial of Service (DDoS)

Distributed denial of service (DDoS) attacks are used to prevent users from accessing certain websites. Unlike some of the other methods listed here, DDoS attacks have to be coordinated and performed by a large number of participants.

DDoS attacks are often done on a political basis. They may be used to cover information or prevent users from accessing websites of high importance. DDoS attacks are often coordinated against cryptocurrency platforms to destabilize them.

Keylogging

Keylogging is a spyware method. If a user’s computer is infected with keylogging software, the hacker is able to see every character that the user types on their keyboard. This can reveal passwords, private messages, and other sensitive information.

Keylogging can also affect mobile devices. Some apps that provide additional emojis or keyboard themes for the device have been proven to be keylogging spyware. Third-party text editing apps sometimes may also log the keyboard presses for unclear intents.

Phishing

Phishing involves a hacker setting up a fraudulent malware-infected website that appears legitimate. A user is tricked into clicking the link as logging into the website, which leads to the computer getting infected. The hacker can then access the files on the victim’s computer, including login details and any other sensitive information.

Phishing attacks are commonly used in the crypto world. In January 2022, the online platform Crypto.com admitted that $30 million worth of cryptocurrency was lost in a phishing attack.

Ransomware

As the name implies, ransomware involves extortion and is used for financial gains. The files on an infected computer are encrypted. Hackers demand victims to pay a ransom for the files to be decrypted and accessible.

Ransomware can be caught by downloading suspicious files or software. However, this method of hacking is on the decline as many hackers have moved onto using cryptomining malware.

Black Hat vs White Hat Hacking

Hacking is most commonly done with malicious intent, such as terrorism, money laundering, or means to illegally sell data. However, in some cases, hacking may be done for a good cause. This disparity has led to the concept of black hat and white hat hackers.

Black hat hackers attack systems maliciously. Their goal is to disrupt the network for personal, usually financial gain. They are known as highly skilled computer experts that can cause severe damage to computer systems.

White hat hackers are also known for their excellent skillset. However, they perform hacks with good intentions. They are often hired by companies to find if there are any exploits in their systems. They work on discovering bugs or any entrance points that black hat hackers may find and patch them before the systems are breached.

Hacking in the Crypto Industry

Hacking is an ever-growing issue in the crypto industry. Hackers target blockchain-based systems due to the possibilities of exploitation. Some cryptocurrencies, like Bitcoin (BTC) or Ethereum (ETH), are valued at thousands of dollars for a single coin, making them a lucrative catch for malicious actors.

Hot wallets are a particularly common target. Since hot wallets require an internet connection to access the crypto assets, hackers may employ methods such as keylogging or phishing to gain access to users’ wallet addresses and claim the funds for themselves.