What is Whitelist and How Does It Work? - Coinleaks
Current Date:September 21, 2024

What is Whitelist and How Does It Work?

Whitelist refers to a list of allowed and identified persons, institutions, computer programs and even cryptocurrency addresses.

Whitelist can take on several different meanings in the world of cryptocurrencies.

Users who sign up for a particular cryptocurrency company’s mailing list are often asked to add the company’s email to their Whitelist.

This is to prevent emails from going to users’ spam folders.

Cryptocurrency companies can also pay to be added to the Whitelist of internet service providers.

In the world of cryptocurrencies, Whitelists are most commonly used in the context of ICOs or withdrawal addresses.

Investors wishing to participate in ICOs are normally Whitelisted after providing their personal information.

When it comes to withdrawal addresses, the Whitelist is all about the list of cryptocurrency addresses that are considered trustworthy.

Only addresses that appear on such lists can withdraw funds from foreign currency accounts.

How Does Whitelist Work?

Whitelist is based on a strict set of policies and is managed by an IT administrator. Using Whitelist when the administrator is sure of access permissions does not require additional understanding of disallowed components as they are denied by default.

Administrators compile a list of allowed resources, targets, or applications that users need to access, and then the list is applied to a network device, desktop or server software, or operating systems. When implemented, the network device or server monitors user, device, or application requests and allows access to services in the Whitelist. All other requested services are denied. While the Whitelist allows access or communication to certain approved applications or services, denied requests include locations or services that meet the following criteria:

  • Software or malicious code such as malware, advanced persistent threats, or ransomware;
  • Contains material that does not comply with company internet usage guidelines;
  • Ring may lead to sensitive materials leaking; and
  • Shadow makes IT inappropriately easy to use.

Whitelist and Blacklist (blocklist)

Although the Whitelist is a list of explicitly allowed applications or services, it is not blacklisted. received or blocked apps or services are expressly denied. There are cases where it is preferable to keep a blacklist rather than a whitelist. For example, it is easier to create a blacklist if the number of items, locations, or apps that should be allowed is greater than those that should be blocked. Content filters and anti-malware applications therefore tend to favor the use of blacklists.