Ethereum's blockchain uses Merkle trees, for security reasons, to improve scalability, and to optimize transaction hashing.[61] As with any Merkle tree implementation, it allows for storage savings, set membership proofs (called "Merkle proofs"), and light client synchronization. The Ethereum network has at times faced congestion problems, for example, congestion occurred during late 2017 in relation to Cryptokitties.[62]
Wallets and similar software technically handle all bitcoins as equivalent, establishing the basic level of fungibility. Researchers have pointed out that the history of each bitcoin is registered and publicly available in the blockchain ledger, and that some users may refuse to accept bitcoins coming from controversial transactions, which would harm bitcoin's fungibility.[123] For example, in 2012, Mt. Gox froze accounts of users who deposited bitcoins that were known to have just been stolen.[124]
Physical wallets can also take the form of metal token coins[102] with a private key accessible under a security hologram in a recess struck on the reverse side.[103]:38 The security hologram self-destructs when removed from the token, showing that the private key has been accessed.[104] Originally, these tokens were struck in brass and other base metals, but later used precious metals as bitcoin grew in value and popularity.[103]:80 Coins with stored face value as high as ₿1000 have been struck in gold.[103]:102–104 The British Museum's coin collection includes four specimens from the earliest series[103]:83 of funded bitcoin tokens; one is currently on display in the museum's money gallery.[105] In 2013, a Utahn manufacturer of these tokens was ordered by the Financial Crimes Enforcement Network (FinCEN) to register as a money services business before producing any more funded bitcoin tokens.[102][103]:80

By comparison to government-backed global currencies, Bitcoin remains fairly complex for the typical user to acquire and use in regular transactions. Growing interest and significant global investments in Bitcoin wallet and Blockchain technology have nonetheless made buying and selling Bitcoin far more accessible to the average user. And indeed growing acceptance by government entities have ameliorated the ambiguity of legal and regulatory status for Bitcoin and Bitcoin exchanges.
Computing power is often bundled together or "pooled" to reduce variance in miner income. Individual mining rigs often have to wait for long periods to confirm a block of transactions and receive payment. In a pool, all participating miners get paid every time a participating server solves a block. This payment depends on the amount of work an individual miner contributed to help find that block.[92]
While another less aggressive soft fork solution was put forth, the Ethereum community and its founders were placed in a perilous position. If they didn’t retrieve the stolen investor money, confidence in Ethereum could be lost. On the other hand, recovering investor money required actions that went against the core ideas of decentralization and set a dangerous precedent.
In March 2017, various blockchain start-ups, research groups, and Fortune 500 companies announced the creation of the Enterprise Ethereum Alliance (EEA) with 30 founding members.[16] By May, the nonprofit organization had 116 enterprise members—including ConsenSys, CME Group, Cornell University's research group, Toyota Research Institute, Samsung SDS, Microsoft, Intel, J. P. Morgan, Cooley LLP, Merck KGaA, DTCC, Deloitte, Accenture, Banco Santander, BNY Mellon, ING, and National Bank of Canada.[17][18][19] By July 2017, there were over 150 members in the alliance, including recent additions MasterCard, Cisco Systems, Sberbank and Scotiabank.[20][21]
Ethereum's smart contracts are based on different computer languages, which developers use to program their own functionalities. Smart contracts are high-level programming abstractions that are compiled down to EVM bytecode and deployed to the Ethereum blockchain for execution. They can be written in Solidity (a language library with similarities to C and JavaScript), Serpent (similar to Python, but deprecated), LLL (a low-level Lisp-like language), and Mutan (Go-based, but deprecated). There is also a research-oriented language under development called Vyper (a strongly-typed Python-derived decidable language).

In Charles Stross' 2013 science fiction novel, Neptune's Brood, the universal interstellar payment system is known as "bitcoin" and operates using cryptography.[227] Stross later blogged that the reference was intentional, saying "I wrote Neptune's Brood in 2011. Bitcoin was obscure back then, and I figured had just enough name recognition to be a useful term for an interstellar currency: it'd clue people in that it was a networked digital currency."[228]

^ Iansiti, Marco; Lakhani, Karim R. (January 2017). "The Truth About Blockchain". Harvard Business Review. Harvard University. Retrieved 17 January 2017. The technology at the heart of bitcoin and other virtual currencies, blockchain is an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way.
Every 2,016 blocks (approximately 14 days at roughly 10 min per block), the difficulty target is adjusted based on the network's recent performance, with the aim of keeping the average time between new blocks at ten minutes. In this way the system automatically adapts to the total amount of mining power on the network.[7]:ch. 8 Between 1 March 2014 and 1 March 2015, the average number of nonces miners had to try before creating a new block increased from 16.4 quintillion to 200.5 quintillion.[86]

The price of bitcoins has gone through cycles of appreciation and depreciation referred to by some as bubbles and busts.[159] In 2011, the value of one bitcoin rapidly rose from about US$0.30 to US$32 before returning to US$2.[160] In the latter half of 2012 and during the 2012–13 Cypriot financial crisis, the bitcoin price began to rise,[161] reaching a high of US$266 on 10 April 2013, before crashing to around US$50. On 29 November 2013, the cost of one bitcoin rose to a peak of US$1,242.[162] In 2014, the price fell sharply, and as of April remained depressed at little more than half 2013 prices. As of August 2014 it was under US$600.[163] During their time as bitcoin developers, Gavin Andresen[164] and Mike Hearn[165] warned that bubbles may occur.
Despite bringing a number of benefits, decentralized applications aren’t faultless. Because smart contract code is written by humans, smart contracts are only as good as the people who write them. Code bugs or oversights can lead to unintended adverse actions being taken. If a mistake in the code gets exploited, there is no efficient way in which an attack or exploitation can be stopped other than obtaining a network consensus and rewriting the underlying code. This goes against the essence of the blockchain which is meant to be immutable. Also, any action taken by a central party raises serious questions about the decentralized nature of an application.
Until relatively recently, building blockchain applications has required a complex background in coding, cryptography, mathematics as well as significant resources. But times have changed. Previously unimagined applications, from electronic voting & digitally recorded property assets to regulatory compliance & trading are now actively being developed and deployed faster than ever before. By providing developers with the tools to build decentralized applications, Ethereum is making all of this possible.
رغم وجود مجموعة محدودة نسبيا من المواقع التي تقبل دفعات بيتكوين لقاء منتجاتها، مقارنةً بالمواقع التي تتعامل بالعملات التقليدية، فإن بيتكوين مدعومة من مجموعة متزايدة من المواقع، من بينها شركات ومواقع كبيرة ومتنوعة، مثل مواقع بيع خدمات الاستضافة وحجز أسماء النطاق والشبكات الاجتماعية ومواقع الفيديو والموسيقى والمواقع المتنوعة التي تبيع مختلف أنواع المنتجات.
تُعتبر بيتكوين عُملة معمّاة (بالإنجليزية: cryptocurrency) ويُقصد بذلك أنها تعتمد بشكل أساسي على مبادئ التشفير في جميع جوانبها، كما أنها تُعتبر أيضا العُملة الأولى من نوعها والأكثر شهرة وانتشارًا لكن رغم ذلك ليست العُملة التشفيرية الوحيدة الموجودة على شبكة الإنترنت حاليًا. حيث يتوفر ما يزيد عن 60 عُملة تشفيرية مُختلفة[6] منها 6 عُملات يُمكن وصفها بالرئيسية [7] وذلك اعتمادًا على عدد المُستخدمين وبنية كل شبكة، إضافة إلى الأماكن التي يُمكن استبدال وشراء هذه العُملات التشفيرية مُقابل عُملات أخرى. جميع العُملات التشفيرية الحالية مبنية على مبدأ عمل عُملة بيتكوين نفسها باستثناء عُملة Ripple [8]، وبما أن عُملة بيتكوين مفتوحة المصدر فإنه من المُمكن استنساخها وإدخال بعض التعديلات عليها ومن ثم إطلاق عُملة جديدة.

Ethereum’s core innovation, the Ethereum Virtual Machine (EVM) is a Turing complete software that runs on the Ethereum network. It enables anyone to run any program, regardless of the programming language given enough time and memory. The Ethereum Virtual Machine makes the process of creating blockchain applications much easier and efficient than ever before. Instead of having to build an entirely original blockchain for each new application, Ethereum enables the development of potentially thousands of different applications all on one platform.
Bitcoin is pseudonymous, meaning that funds are not tied to real-world entities but rather bitcoin addresses. Owners of bitcoin addresses are not explicitly identified, but all transactions on the blockchain are public. In addition, transactions can be linked to individuals and companies through "idioms of use" (e.g., transactions that spend coins from multiple inputs indicate that the inputs may have a common owner) and corroborating public transaction data with known information on owners of certain addresses.[120] Additionally, bitcoin exchanges, where bitcoins are traded for traditional currencies, may be required by law to collect personal information.[121] To heighten financial privacy, a new bitcoin address can be generated for each transaction.[122]
There is ongoing research on how to use formal verification to express and prove non-trivial properties. A Microsoft Research report noted that writing solid smart contracts can be extremely difficult in practice, using The DAO hack to illustrate this problem. The report discussed tools that Microsoft had developed for verifying contracts, and noted that a large-scale analysis of published contracts is likely to uncover widespread vulnerabilities. The report also stated that it is possible to verify the equivalence of a Solidity program and the EVM code.[41]
Ethereum enables developers to build and deploy decentralized applications. A decentralized application or Dapp serve some particular purpose to its users. Bitcoin, for example, is a Dapp that provides its users with a peer to peer electronic cash system that enables online Bitcoin payments. Because decentralized applications are made up of code that runs on a blockchain network, they are not controlled by any individual or central entity.
بروتوكول اكتشاف الجيران (NDP) بروتوكول حل العناوين (ARP) بروتوكولات نفقيّة (بروتوكول الأنفاق في الطبقة الثانية) بروتوكول الربط بين نقطتين (PPP) بروتوكول الشجرة المُتفرعة (STP) الواجهة البينية للبيانات الموزعة بالألياف (FDDI) تبديل الأطر الإيثرنت (IEEE 802.3). الشبكات المحليّة اللاسلكيّة (IEEE 802.11) الشبكات الشخصية اللاسلكية (IEEE 802.15) البلوتوث (IEEE 802.15.1) الشبكات الشخصية اللاسلكية منخفضة المعدل (IEEE 802.15.4) مزيد ..
Despite the fallout from The DAO hack, Ethereum is moving forward and looking to a bright future. By providing a user-friendly platform that enables people to harness the power of blockchain technology, Ethereum is speeding up the decentralization of the world economy. Decentralized applications have the potential to profoundly disrupt hundreds of industries including finance, real estate, academia, insurance, healthcare and the public sector amongst many others. 
×