[{"data":1,"prerenderedAt":326},["ShallowReactive",2],{"api/learn-center-post-en-GB-what-is-phishing":3,"en-gb/learn/security/what-is-phishing-en-GB-seo":57,"footer-en-GB":62,"navigation-en-GB-learn-center":235,"api/learn-categories-en-GB":286},{"seo":4,"locale":28,"breadcrumbs":29,"excerpt":37,"featuredImage":38,"components":39,"title":5,"formattedPublishedAt":50,"geofencings":51,"category":52,"pagination":54,"campaignExternalId":8},{"title":5,"metaTitle":6,"metaDescription":7,"keywords":8,"metaRobots":8,"structuredData":9,"metaImage":10,"metaSocial":18,"canonicalURL":8,"localizations":19},"What is phishing?","What is phishing? | Bitstamp by Robinhood","What is phishing? How can you protect yourself against it? Read our guide to phishing and start trading on Bitstamp by Robinhood – the original crypto exchange.",null,{},{"url":11,"mime":12,"ext":13,"width":14,"height":15,"name":16,"alt":17},"bitstampImageUrl/What_is_Phishing_1png_fc4b35bebf_3fe22bcb8a.png","image/png",".png",1920,1080,"What_is_Phishing_1png_fc4b35bebf.png","",[],[20,23,26],{"pathname":21,"locale":22},"/learn/security/what-is-phishing/","en",{"pathname":24,"locale":25},"/es/learn/security/what-is-phishing/","es",{"pathname":27,"locale":28},"/en-gb/learn/security/what-is-phishing/","en-GB",[30,34],{"id":31,"text":32,"url":31,"asUrl":33},"/learn/security/","Security",true,{"id":35,"text":5,"url":27,"asUrl":36},"what-is-phishing",false,"\u003Cp>Phishing is an online attack where malicious actors send messages to victims pretending to be a trusted person or company.\u003C/p>\n",{"url":11,"mime":12,"ext":13,"width":14,"height":15,"name":16,"alt":17},[40],{"component":41,"props":42,"content":43,"secondaryContent":47,"ctas":48,"secondaryCtas":49,"ctasNoMarginTop":36},"section.full-text",{"centered":36,"withoutSectionContainer":36},{"text":44,"width":45,"align":46},"\u003Cp>Phishing is an online attack where malicious actors send messages to victims pretending to be a trusted person or company.\u003C/p>\n\u003Cp>Phishing is an example of a social engineering attack, which is a tactic of manipulating, or influencing, someone in order to control their computer system or steal personal or financial information.\u003C/p>\n\u003Cp>Specifically, phishing attacks attempt to manipulate users into providing sensitive information (like access credentials, personal identifiers, financial information, and passwords), installing dangerous files and software, or clicking malicious links.\u003C/p>\n\u003Ch2>How does phishing work?\u003C/h2>\n\u003Cp>Phishing happens via an electronic message sent using text, email, social media, or other online communication channels.\u003C/p>\n\u003Cp>Phishers can use any public resources available to gather information about their victims. They then use this information to create a reliable fake message to lure their victims into performing an action. This message sent to victim can appear to come from a trusted and reliable source, such as a person they know, a club they are associated with, or any site or platform where they have an account.\u003C/p>\n\u003Cp>Attacks can happen through malicious attachments or links to fake websites (that look like the website they are attempting to replicate). The fake websites, however, are set up to collect private information such as passwords, payment information, and private keys.\u003C/p>\n\u003Ch2>Types of phishing\u003C/h2>\n\u003Ch3>Email phishing\u003C/h3>\n\u003Cp>Email phishing is the most common occurrence of phishing and happens when attacks are sent via email.\u003C/p>\n\u003Cp>Typically, attackers will use fake domains that look like real ones (for example: replacing an ‘m’ with an ‘rn’) to trick users into clicking a link or responding with sensitive information.\u003C/p>\n\u003Ch3>Spear phishing\u003C/h3>\n\u003Cp>Spear phishing is similar to email phishing but, rather than attacking a large group of random people in the hopes that one responds, they are targeted attacks towards specific groups within organizations (like the entire HR staff) or even specific individuals.\u003C/p>\n\u003Cp>Attackers try to use spear phishing to either gain employee credentials or to infect employee devices with malware (software designed to take control of a computer system).\u003C/p>\n\u003Ch3>Whaling\u003C/h3>\n\u003Cp>Whaling is the version of phishing targeted at high-profile individuals within an organization, generally executives (like a CEO or CFO).\u003C/p>\n\u003Cp>Whaling emails are typically more specific and sophisticated than general phishing emails and can contain personal information on the person being targeted, as well as a deeper knowledge of the business.\u003C/p>\n\u003Ch3>Smishing\u003C/h3>\n\u003Cp>Smishing, also known as SMS phishing, is a targeted attack using text messages from respected companies to garner personal information, like passwords or credit card information.\u003C/p>\n\u003Cp>Attackers might entice victims to click a link to a website that looks similar to the organization they are impersonating.\u003C/p>\n\u003Ch3>Vishing\u003C/h3>\n\u003Cp>Vishing, or voice phishing, is the practice of using phone calls to conduct phishing attacks. Perpetrators will call individuals pretending to be from a company and attempt to get them to reveal personal information.\u003C/p>\n\u003Ch3>Airdrop phishing\u003C/h3>\n\u003Cp>This type of phishing is specific to crypto and happens when \u003Ca href=\"/en-gb/learn/crypto-101/what-are-airdrops-in-crypto/\">airdrops\u003C/a> are used for malicious purposes.\u003C/p>\n\u003Cp>Recipients might find an unsolicited allocation of “locked” tokens, or unrevealed \u003Ca href=\"/en-gb/learn/web3/what-are-nfts-non-fungible-tokens/\">NFTs\u003C/a>, in their wallets and discover that they’re being asked to buy more tokens, hand over their \u003Ca href=\"/en-gb/learn/security/what-are-private-and-public-keys/\">private keys\u003C/a>, or connect their wallet to a third-party website where it risks being drained of funds.\u003C/p>\n\u003Ch2>How to spot a phishing attack\u003C/h2>\n\u003Cp>While cybercriminals are becoming better at creating authentic-looking messages, there are various ways for users to detect scams.\u003C/p>\n\u003Cp>First, some messages can be spotted due to poor copywriting, grammatical errors and improper use of fonts and logos.\u003C/p>\n\u003Cp>Second, a lot of phishing messages offer threats, like a threat of a lawsuit, or use a sense of urgency to force victims to act quickly. This is done with the hope that readers will not read the message thoroughly and act on impulse. Further, these types of messages will often incentivize readers to perform a strange request, like opening a malicious link or installing specific software on your computer.\u003C/p>\n\u003Cp>The best way to spot a phishing message is to spot inconsistencies in web addresses. These can be found in the email address of the sender, or in the specific links within the message. For example, when receiving an email claiming to come from Bitstamp by Robinhood, readers must make sure that the sender’s email address ends in @bitstamp.net. Further, if there is a link in the email, readers should hover over it with their mouse. If the link doesn’t contain “bitstamp.net”, they should not click the link and discard the email.\u003C/p>\n\u003Cp>\u003Cstrong>Note\u003C/strong> that many phishing messages will contain requests for credentials, payment information, or other personal details (like asking for a \u003Ca href=\"/en-gb/learn/crypto-101/what-is-cryptocurrency/\">cryptocurrency\u003C/a> wallet’s seed phrase). Before offering this information, ensure that you checked the source thoroughly, especially if the message was received unexpectedly.\u003C/p>\n\u003Ch2>Phishing essentials\u003C/h2>\n\u003Cul>\n\u003Cli>Phishing is a cyber-attack where individuals are contacted via email, phone, or text and are directed to divulge personal information (like passwords or credit card information).\u003C/li>\n\u003Cli>Types of phishing include email phishing, spear phishing, whaling, vishing, smishing, and airdrop phishing.\u003C/li>\n\u003Cli>There are various ways to spot phishing messages, such as looking for grammatical errors in the messages, or studying the links in the message carefully.\u003C/li>\n\u003C/ul>\n","full","left",{"text":17},[],[],"July 29th, 2024",{},{"title":32,"url":31,"geofencings":53},{},{"previous":55,"next":56},"/en-gb/learn/security/what-is-blockchain-immutability/","/en-gb/learn/security/what-is-proof-of-reserves/",{"description":7,"ogDescription":7,"ogImage":58,"twitterImage":58,"twitterSite":59,"twitterCreator":59,"twitterCard":60,"twitterTitle":6,"twitterDescription":7,"titleTemplate":61},"https://assets.bitstamp.net/msc/_ipx/enlarge_true&f_png&fit_cover&q_85&s_1200x630/bitstampImageUrl/What_is_Phishing_1png_fc4b35bebf_3fe22bcb8a.png","@Bitstamp","summary_large_image","%s",{"ready":33,"sections":63,"disclaimer":233,"copyright":234},[64,102,115,138,175,194],{"title":65,"content":17,"items":66},"About",[67,72,77,82,87,92,97],{"noFollow":33,"isExternal":36,"name":68,"value":69,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":70,"geofencings":71},"Who We Are","/about-us/",{},{},{"noFollow":33,"isExternal":33,"name":73,"value":74,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":75,"geofencings":76},"Careers","https://bitstamp.workable.com/",{},{},{"noFollow":33,"isExternal":36,"name":78,"value":79,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":80,"geofencings":81},"Legal & Privacy","/legal/",{},{},{"noFollow":33,"isExternal":36,"name":83,"value":84,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":85,"geofencings":86},"Legal & Privacy - USA","/legal/terms-of-use/inc/",{},{},{"noFollow":33,"isExternal":36,"name":88,"value":89,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":90,"geofencings":91},"For Law Enforcement","/legal/guidelines-for-law-enforcement-agencies/",{},{},{"noFollow":33,"isExternal":36,"name":93,"value":94,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":95,"geofencings":96},"Fee Schedule","/fee-schedule/",{},{},{"noFollow":36,"isExternal":36,"name":98,"value":99,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":100,"geofencings":101},"FAQ","/faq/",{},{},{"title":103,"content":17,"items":104},"Products",[105,110],{"noFollow":36,"isExternal":36,"name":106,"value":107,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":108,"geofencings":109},"Mobile Apps","/mobile/",{},{},{"noFollow":36,"isExternal":36,"name":111,"value":112,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":113,"geofencings":114},"Tradeview","/market/tradeview/",{},{},{"title":116,"content":17,"items":117},"Services",[118,123,128,133],{"noFollow":36,"isExternal":36,"name":119,"value":120,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":121,"geofencings":122},"Institutions & Partners","/institutional-trading/",{},{},{"noFollow":36,"isExternal":36,"name":124,"value":125,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":126,"geofencings":127},"Bitstamp as a Service","/bitstamp-as-a-service/",{},{},{"noFollow":36,"isExternal":36,"name":129,"value":130,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":131,"geofencings":132},"The Bitstamp Ecosystem","/partners/",{},{},{"noFollow":36,"isExternal":36,"name":134,"value":135,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":136,"geofencings":137},"Pro","/pro/",{},{},{"title":139,"content":17,"items":140},"Resources",[141,146,151,156,160,165,170],{"noFollow":33,"isExternal":36,"name":142,"value":143,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":36,"showOnMobile":33,"attachment":144,"geofencings":145},"HTTP API","/api/",{},{},{"noFollow":36,"isExternal":36,"name":147,"value":148,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":36,"showOnMobile":33,"attachment":149,"geofencings":150},"Websocket API v2","/websocket/v2/",{},{},{"noFollow":36,"isExternal":36,"name":152,"value":153,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":36,"showOnMobile":33,"attachment":154,"geofencings":155},"FIX v2","/fix/v2/",{},{},{"noFollow":33,"isExternal":36,"name":157,"value":143,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":36,"attachment":158,"geofencings":159},"API Documentation",{},{},{"noFollow":36,"isExternal":36,"name":161,"value":162,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":163,"geofencings":164},"PGP Key","/pgp-key/",{},{},{"noFollow":36,"isExternal":36,"name":166,"value":167,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":168,"geofencings":169},"Lightning Network","/lightning-network-node/",{},{},{"noFollow":36,"isExternal":36,"name":171,"value":172,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":173,"geofencings":174},"Crypto Pulse","/crypto-pulse/",{},{},{"title":176,"content":17,"items":177},"Address",[178,182,186,190],{"noFollow":36,"isExternal":36,"name":179,"value":17,"isEmail":36,"isPhoneNumber":36,"isText":33,"showOnDesktop":33,"showOnMobile":33,"attachment":180,"geofencings":181},"Bitstamp Ltd",{},{},{"noFollow":36,"isExternal":36,"name":183,"value":17,"isEmail":36,"isPhoneNumber":36,"isText":33,"showOnDesktop":33,"showOnMobile":33,"attachment":184,"geofencings":185},"5 New Street Square",{},{},{"noFollow":36,"isExternal":36,"name":187,"value":17,"isEmail":36,"isPhoneNumber":36,"isText":33,"showOnDesktop":33,"showOnMobile":33,"attachment":188,"geofencings":189},"London, EC4A 3TW",{},{},{"noFollow":36,"isExternal":36,"name":191,"value":17,"isEmail":36,"isPhoneNumber":36,"isText":33,"showOnDesktop":33,"showOnMobile":33,"attachment":192,"geofencings":193},"United Kingdom",{},{},{"title":195,"content":17,"items":196},"Contact",[197,202,206,210,214,218,223,228],{"noFollow":36,"isExternal":36,"name":198,"value":199,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":200,"geofencings":201},"Customer support","/customer-support/",{},{},{"noFollow":36,"isExternal":36,"name":203,"value":203,"isEmail":33,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":204,"geofencings":205},"info@bitstamp.net",{},{},{"noFollow":36,"isExternal":36,"name":207,"value":207,"isEmail":33,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":208,"geofencings":209},"press@bitstamp.net",{},{},{"noFollow":36,"isExternal":36,"name":211,"value":211,"isEmail":33,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":212,"geofencings":213},"support@bitstamp.net",{},{},{"noFollow":36,"isExternal":36,"name":215,"value":215,"isEmail":33,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":216,"geofencings":217},"complaints@bitstamp.net",{},{},{"noFollow":36,"isExternal":36,"name":219,"value":220,"isEmail":36,"isPhoneNumber":33,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":221,"geofencings":222},"+44 20 3868 9628","+442038689628",{},{},{"noFollow":36,"isExternal":36,"name":224,"value":225,"isEmail":36,"isPhoneNumber":33,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":226,"geofencings":227},"+1 800 712 5702","+18007125702",{},{},{"noFollow":36,"isExternal":36,"name":229,"value":230,"isEmail":36,"isPhoneNumber":33,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":231,"geofencings":232},"+352 20 88 10 96","+35220881096",{},{},"\u003Cp>Please read the general \u003Ca href=\"/legal/risk-warning/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Risk Warning\u003C/a>, and \u003Ca href=\"/legal/uk-investment-risk-warning/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Risk Summary\u003C/a> for UK residents before investing in crypto-assets. \u003C/p>\n\u003Cp>Crypto-assets services are provided by the following Bitstamp legal entities depending on client residency: (1) Bitstamp Europe S.A., which is authorized by the Commission de Surveillance du Secteur Financier (CSSF) in Luxembourg as a payment institution (licence number Z00000012) and crypto-asset service provider (licence number N00000003); Registered address: 40, avenue Monterey, L-2163 Luxembourg, Grand Duchy of Luxembourg; Registration number: B196856; (2) Bitstamp UK Ltd., which is registered with the Financial Conduct Authority (FCA) in the UK for the provision of certain cryptoassets activities under the Money Laundering Regulations (Firm Reference Number 978690); Registered address: 5 New Street Square, EC4A 3TW London, United Kingdom; Registration number: 14174243; (3) Bitstamp Ltd.with its registered address at 5 New Street Square, EC4A 3TW London, United Kingdom and registration number: 8157033; (4) Bitstamp Global Ltd., which is registered as a Virtual Asset Service Provider in the British Virgin Islands and is supervised by the British Virgin Islands Financial Services Commission (FSC); Registered address: Floor 4, Banco Popular Building, Road Town, Tortola VG1110, British Virgin Islands; Registered number: 2086429; and (5) Bitstamp Asia Pte Ltd, which is authorized by the Monetary Authority of Singapore (MAS) as a major payment institution (licence number PS20200667); Registered address: 63 Chulia Street, OCBC Centre East, #15-01, Singapore 049514; Registered number: 202016687K;\u003C/p>\n\u003Cp>Virtual currency services to US residents are provided by Bitstamp USA, Inc., which is licensed to engage in virtual currency business activity by the New York State Department of Financial Services. Licensed as a Money Transmitter by the New York State Department of Financial Services. Review a \u003Ca href=\"/legal/usa-inc/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">list of its licenses and other registrations\u003C/a> (NMLS number \u003Ca href=\"https://www.nmlsconsumeraccess.org/EntityDetails.aspx/COMPANY/1905429\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">1905429\u003C/a>) for more information; Registered address: 85 Willow Road, Menlo Park, CA 94025, United States of America; Registered number: 5481543.\u003C/p>\n\u003Cp>Investment services with regards to trading in crypto derivatives are provided by Bitstamp Financial Services Ltd., which is authorized and supervised by the Slovenian Securities Market Agency (ATVP) as a MiFiD investment firm. Trading crypto derivatives carries significant risks and may result in substantial losses. Please trade responsibly and ensure you understand the associated risks. You can find more about the risks \u003Ca href=\"/legal/financial-services/general-terms-and-conditions/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">here\u003C/a>. To help you understand the risks involved we have put together a series of \u003Ca href=\"/derivatives/key-information-documents/\" target=\"_blank\" rel=\"noopener noreferrer\">Key Information Documents (KIDs)\u003C/a> highlighting the risks and rewards related to each derivatives contract. Crypto derivatives trading is not available to customers in the US, Canada, Japan and some other countries. Bitstamp Financial Services Ltd. does not provide crypto-asset services.\u003C/p>\n\u003Cp>To find out more about which Bitstamp entity you receive services from, please check the Profile/My information in your Bitstamp account. You can read more about our legal terms, policies and disclosures \u003Ca href=\"/legal/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">here\u003C/a>.\u003C/p>\n","\u003Cp>All rights reserved © 2026 Bitstamp by Robinhood. \u003Ca href=\"https://www.nmlsconsumeraccess.org/EntityDetails.aspx/COMPANY/1905429\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">NMLS #1905429\u003C/a>\u003C/p>\n",{"items":236,"ready":33,"platformButtonText":282,"backButtonText":283,"logInButtonText":284,"signUpButtonText":285},[237,242,248,251,255,260,265,268,273,278],{"headerName":238,"sidemenuName":119,"url":239,"noFollow":36,"showInHeader":33,"showInSidemenu":33,"geofencings":240,"submenu":241,"tag":17},"Institutions","/en-gb/institutional-trading/",{},[],{"headerName":243,"sidemenuName":243,"url":244,"noFollow":36,"showInHeader":33,"showInSidemenu":33,"geofencings":245,"submenu":246,"tag":247},"Derivatives","/perpetual-futures/",{},[],"NEW",{"headerName":134,"sidemenuName":134,"url":135,"noFollow":36,"showInHeader":33,"showInSidemenu":33,"geofencings":249,"submenu":250,"tag":17},{},[],{"headerName":252,"sidemenuName":252,"url":107,"noFollow":36,"showInHeader":33,"showInSidemenu":33,"geofencings":253,"submenu":254,"tag":17},"Mobile App",{},[],{"headerName":256,"sidemenuName":256,"url":257,"noFollow":36,"showInHeader":33,"showInSidemenu":33,"geofencings":258,"submenu":259,"tag":17},"Markets","/markets/",{},[],{"headerName":261,"sidemenuName":261,"url":262,"noFollow":36,"showInHeader":33,"showInSidemenu":33,"geofencings":263,"submenu":264,"tag":17},"Earn Stake","/en-gb/crypto-staking/",{},[],{"headerName":111,"sidemenuName":111,"url":112,"noFollow":36,"showInHeader":33,"showInSidemenu":33,"geofencings":266,"submenu":267,"tag":17},{},[],{"headerName":269,"sidemenuName":269,"url":270,"noFollow":36,"showInHeader":33,"showInSidemenu":33,"geofencings":271,"submenu":272,"tag":17},"Blog","https://blog.bitstamp.net/",{},[],{"headerName":274,"sidemenuName":274,"url":275,"noFollow":36,"showInHeader":33,"showInSidemenu":33,"geofencings":276,"submenu":277,"tag":17},"Learn","/learn/",{},[],{"headerName":279,"sidemenuName":279,"url":107,"noFollow":36,"showInHeader":36,"showInSidemenu":33,"geofencings":280,"submenu":281,"tag":17},"Get Bitstamp by Robinhood app",{},[],"Go to platform","Back","Log in","Get started",[287,291,295,299,303,307,311,315,318,322],{"title":288,"url":289,"geofencings":290},"Blockchain technology","/en-gb/learn/blockchain/",{},{"title":292,"url":293,"geofencings":294},"Company profiles","/en-gb/learn/company-profiles/",{},{"title":296,"url":297,"geofencings":298},"Crypto 101","/en-gb/learn/crypto-101/",{},{"title":300,"url":301,"geofencings":302},"Crypto definitions","/en-gb/learn/crypto-definitions/",{},{"title":304,"url":305,"geofencings":306},"Crypto trading","/en-gb/learn/crypto-trading/",{},{"title":308,"url":309,"geofencings":310},"Cryptocurrency guide","/en-gb/learn/cryptocurrency-guide/",{},{"title":312,"url":313,"geofencings":314},"People profiles","/en-gb/learn/people-profiles/",{},{"title":32,"url":316,"geofencings":317},"/en-gb/learn/security/",{},{"title":319,"url":320,"geofencings":321},"Tutorials","/en-gb/learn/bitstamp-tutorials/",{},{"title":323,"url":324,"geofencings":325},"Web3","/en-gb/learn/web3/",{},1776263803638]