• غطاء تمويلى للمنظمات الإرهابية: قامت دار الإفتاء المصرية بتصريح أن عمليات الإستثمار والتداول في البيتكوين تُعتبر عمليات مُحرمة من قبل الدين والشرع حيث إنها تعمل كغطاء لتمويل المنظمات الإرهابية وعصابات المُخدرات. كما لعدم وجود هيئات حكومية وبنوك مركزية كان لذلك آثر رهيب على استخدام إستثمارات البيتكوين في عمليات غسيل الأموال والتى بالطبع نهانا الرسول عنها، بل ويُحاسب عليها القانون أيضاً.


• إستثمار البيتكوين يُعتبر مُقامرة: طبقاُ إلى رأى أستاذ الفقه د/جلوى الجميعة أن البيتكوين ما هى إلا عُملات يتم إستخدامها للمقامرة. حيث أن عملة البيتكوين هى عملة إفتراضية إلكترونية ليس لها أى سند أو غطاء من الذهب أو الفضة وبالتالى هى في حُكم الدين تُعتبر سلعة مجهولة المصدر. وبالتالى تتيح حدوث الكثير من عمليات النصب والإحتيال نتيجة لعدم وجود أى جهات رقابية تراقب سير عملية التداول والإستثمار الخاصة بالعملات. كما نهى الرسول تماماً عن مثل هذا النوع من الإستثمار عندما قال ”  صلى الله عليه وسلم عن شراء ما في بطون الانعام حتى تضع، وعما في ضروعها إلا بكيل أو وزن، ونهى عن شراء العبد وهو آبق، وعن شراء المغانم حتى تقسم، وعن شراء الصدقات حتى تقبض، وعن ضربة الغائص”.
Ethereum's blockchain uses Merkle trees, for security reasons, to improve scalability, and to optimize transaction hashing.[61] As with any Merkle tree implementation, it allows for storage savings, set membership proofs (called "Merkle proofs"), and light client synchronization. The Ethereum network has at times faced congestion problems, for example, congestion occurred during late 2017 in relation to Cryptokitties.[62]
In October 2015,[63] a development governance was proposed as Ethereum Improvement Proposal, aka EIP, standardized on EIP-1.[64] The core development group and community were to gain consensus by a process regulated EIP. A few notable decisions were made in the process of EIP, such as EIP-160 (EXP cost increase caused by Spurious Dragon Hardfork)[65] and EIP-20 (ERC-20 Token Standard).[66] In January 2018, the EIP process was finalized and published as EIP-1 status turned "active".[63]
Physical wallets store the credentials necessary to spend bitcoins offline and can be as simple as a paper printout of the private key;[7]:ch. 10 a paper wallet. A paper wallet is created with a keypair generated on a computer with no internet connection; the private key is written or printed onto the paper[g] and then erased from the computer. The paper wallet can then be stored in a safe physical location for later retrieval. Bitcoins stored using a paper wallet are said to be in cold storage.[99]:39 In a 2014 interview, QuadrigaCX founder Gerald Cotten explained that the company stored customer funds on paper wallets in safe deposit boxes: "So we just send money to them, we don’t need to go back to the bank every time we want to put money into it. We just send money from our Bitcoin app directly to those paper wallets, and keep it safe that way."[100]

Several news outlets have asserted that the popularity of bitcoins hinges on the ability to use them to purchase illegal goods.[135][222] Nobel-prize winning economist Joseph Stiglitz says that bitcoin's anonymity encourages money laundering and other crimes, "If you open up a hole like bitcoin, then all the nefarious activity will go through that hole, and no government can allow that." He's also said that if "you regulate it so you couldn't engage in money laundering and all these other [crimes], there will be no demand for Bitcoin. By regulating the abuses, you are going to regulate it out of existence. It exists because of the abuses."[223][224]
Third-party internet services called online wallets offer similar functionality but may be easier to use. In this case, credentials to access funds are stored with the online wallet provider rather than on the user's hardware.[97] As a result, the user must have complete trust in the online wallet provider. A malicious provider or a breach in server security may cause entrusted bitcoins to be stolen. An example of such a security breach occurred with Mt. Gox in 2011.[98]
The domain name "bitcoin.org" was registered on 18 August 2008.[17] On 31 October 2008, a link to a paper authored by Satoshi Nakamoto titled Bitcoin: A Peer-to-Peer Electronic Cash System[4] was posted to a cryptography mailing list.[18] Nakamoto implemented the bitcoin software as open-source code and released it in January 2009.[19][20][11] Nakamoto's identity remains unknown.[10]
Bitcoin, along with other cryptocurrencies, has been described as an economic bubble by at least eight Nobel Memorial Prize in Economic Sciences laureates, including Robert Shiller,[193] Joseph Stiglitz,[194] and Richard Thaler.[195][14] Noted Keyensian economist Paul Krugman wrote in his New York Times column criticizing bitcoin, calling it a bubble and a fraud;[196] and professor Nouriel Roubini of New York University called bitcoin the "mother of all bubbles."[197] Central bankers, including former Federal Reserve Chairman Alan Greenspan,[198] investors such as Warren Buffett,[199][200] and George Soros[201] have stated similar views, as have business executives such as Jamie Dimon and Jack Ma.[202]
Transactions are defined using a Forth-like scripting language.[7]:ch. 5 Transactions consist of one or more inputs and one or more outputs. When a user sends bitcoins, the user designates each address and the amount of bitcoin being sent to that address in an output. To prevent double spending, each input must refer to a previous unspent output in the blockchain.[77] The use of multiple inputs corresponds to the use of multiple coins in a cash transaction. Since transactions can have multiple outputs, users can send bitcoins to multiple recipients in one transaction. As in a cash transaction, the sum of inputs (coins used to pay) can exceed the intended sum of payments. In such a case, an additional output is used, returning the change back to the payer.[77] Any input satoshis not accounted for in the transaction outputs become the transaction fee.[77]
• غطاء تمويلى للمنظمات الإرهابية: قامت دار الإفتاء المصرية بتصريح أن عمليات الإستثمار والتداول في البيتكوين تُعتبر عمليات مُحرمة من قبل الدين والشرع حيث إنها تعمل كغطاء لتمويل المنظمات الإرهابية وعصابات المُخدرات. كما لعدم وجود هيئات حكومية وبنوك مركزية كان لذلك آثر رهيب على استخدام إستثمارات البيتكوين في عمليات غسيل الأموال والتى بالطبع نهانا الرسول عنها، بل ويُحاسب عليها القانون أيضاً.

Ethereum was proposed in late 2013 by Vitalik Buterin, a cryptocurrency researcher and programmer. Development was funded by an online crowdsale that took place between July and August 2014.[4] The system then went live on 30 July 2015, with 72 million coins "premined". This accounts for about 68 percent of the total circulating supply in 2019. [5]
Leveraged trading in foreign currency or off-exchange products on margin carries significant risk and may not be suitable for all investors. We advise you to carefully consider whether trading is appropriate for you based on your personal circumstances. Forex trading involves risk. Losses can exceed deposits. We recommend that you seek independent advice and ensure you fully understand the risks involved before trading.
Leveraged trading in foreign currency or off-exchange products on margin carries significant risk and may not be suitable for all investors. We advise you to carefully consider whether trading is appropriate for you based on your personal circumstances. Forex trading involves risk. Losses can exceed deposits. We recommend that you seek independent advice and ensure you fully understand the risks involved before trading.
نيمكوين : مليون هو مجموع عملة ال نيمكوين وهذا يعني أن ال نيمكوين ستكون نادرة نسبيا، بالضبط نفس مستوى ندرة ال بيتكوين . هذا وتساعد ال نيمكوين على إنشاء الإنترنت الغير خاضعة للرقابة، وتنكر السيطرة الحكومية. وهي منصة متعددة الاستخدامات يمكن استخدامها لنظام أسماء النطاقات الغير مركزي والغير منظم، نوع من الإنترنت الخاصة بها. ويمكن أيضا أن تستخدم لإرسال الرسائل، والتصويت، ونظام تسجيل الدخول.
Ethereum's blockchain uses Merkle trees, for security reasons, to improve scalability, and to optimize transaction hashing.[61] As with any Merkle tree implementation, it allows for storage savings, set membership proofs (called "Merkle proofs"), and light client synchronization. The Ethereum network has at times faced congestion problems, for example, congestion occurred during late 2017 in relation to Cryptokitties.[62]
Network nodes can validate transactions, add them to their copy of the ledger, and then broadcast these ledger additions to other nodes. To achieve independent verification of the chain of ownership each network node stores its own copy of the blockchain.[76] About every 10 minutes, a new group of accepted transactions, called a block, is created, added to the blockchain, and quickly published to all nodes, without requiring central oversight. This allows bitcoin software to determine when a particular bitcoin was spent, which is needed to prevent double-spending. A conventional ledger records the transfers of actual bills or promissory notes that exist apart from it, but the blockchain is the only place that bitcoins can be said to exist in the form of unspent outputs of transactions.[7]:ch. 5
After much debate, the Ethereum community voted and decided to retrieve the stolen funds by executing what’s known as a hard fork or a change in code. The hard fork moved the stolen funds to a new smart contract designed to let the original owners withdraw their tokens. But this is where things get complicated. The implications of this decision are controversial and the topic of intense debate.
البيتكوين عملة رقمية ذات مجهولية، حيث أن عملية التحويل عبرها يتطلب فقط معرفة رقم محفظة الشخص المحول إليه ويتم تخزين عملية التحويل في سلسلة الكتل برقم تسلسلي خاص ولا يتضمن هذا اسم المرسل او المتلقي او اي بيانات اخرى خاصة بهما، مما يجعل منها فكرة رائجة لدى كل من المدافعين عن الخصوصية، أو بائعي البضائع غير المشروعة (مثل المخدرات) عبر الإنترنت على حد سواء.[9]
^ Jump up to: a b c d "Statement of Jennifer Shasky Calvery, Director Financial Crimes Enforcement Network United States Department of the Treasury Before the United States Senate Committee on Banking, Housing, and Urban Affairs Subcommittee on National Security and International Trade and Finance Subcommittee on Economic Policy" (PDF). fincen.gov. Financial Crimes Enforcement Network. 19 November 2013. Archived (PDF) from the original on 9 October 2016. Retrieved 1 June 2014.
لضمان صحّة عمليات التحويل، يقوم نظام البيتكوين بالاحتفاظ بسجل حسابات تُسجل فيه جميع الإجراءات التي تتم على الشبكة يُطلق عليه اسم سلسلة الكُتل (بالإنجليزية: block chain). تتشارك جميع العُقد المتواجدة على شبكة البيتكوين هذا السجل عبر نظام يعتمد على بروتوكول بِتكُيِن. تحتوي سلسلة الكُتل على جميع الإجراءات التي تمت باستخدام بِتكُيِن، وهو ما يُمكن من معرفة الرصيد الذي يملكه كل عنوان على هذه الشبكة. يُطلق على هذا المفهوم وصف السلسلة للترابط المتواجد ما بين الكُتل، حيث تحتوي كل كُتلة على هاش الكُتلة التي تسبقها ويتواصل الأمر إلى غاية الوصول إلى الكُتلة الأولى التي يُطلق عليها اسم "كتلة التكوين" (بالإنجليزية: genesis block) . تكوين السلسلة بهذه الطريقة يجعل من مهمة تغيير أي كُتلة بعد مرور مُدة مُعينة على إنشائها في غاية الصعوبة، حيث أن تغيير أي كُتلة يتطلب تغيير كل الكُتل التي تليها بسبب الحاجة إلى إعادة حساب هاش كل كُتلة لتحديث قيمة هاش الكُتلة السابقة فيها. هذه الخاصية هي ما يجعل من مُشكل الإنفاق المُتكرر لنفس العُملات في غاية الصعوبة على بِتكُيِن، بل ويُمكن اعتبار سلسلة الكُتل العمود الفقري الذي لا يُمكن لعُملة بِتكُيِن الوقوف من دونه[10]. 

Here’s why. Ethereum is based on blockchain technology where all transactions are meant to be irreversible and unchangeable. By executing a hard fork and rewriting the rules by which the blockchain executes, Ethereum set a dangerous precedent that goes against the very essence of blockchain. If the blockchain is changed every time a large enough amount of money is involved, or enough people get negatively impacted, the blockchain will lose its main value proposition – secure, anonymous, tamper proof & unchangeable.

Here’s why. Ethereum is based on blockchain technology where all transactions are meant to be irreversible and unchangeable. By executing a hard fork and rewriting the rules by which the blockchain executes, Ethereum set a dangerous precedent that goes against the very essence of blockchain. If the blockchain is changed every time a large enough amount of money is involved, or enough people get negatively impacted, the blockchain will lose its main value proposition – secure, anonymous, tamper proof & unchangeable.
^ Beikverdi, A.; Song, J. (June 2015). Trend of centralization in Bitcoin's distributed network. 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD). pp. 1–6. doi:10.1109/SNPD.2015.7176229. ISBN 978-1-4799-8676-7. Archived from the original on 26 January 2018.
Ethereum was initially described in a white paper by Vitalik Buterin,[10] a programmer involved with Bitcoin Magazine, in late 2013 with a goal of building decentralized applications.[11][12] Buterin had argued that Bitcoin needed a scripting language for application development. Failing to gain agreement, he proposed development of a new platform with a more general scripting language.[4]:88
^ "Crib Sheet: Neptune's Brood – Charlie's Diary". www.antipope.org. Archived from the original on 14 June 2017. Retrieved 5 December 2017. I wrote Neptune's Brood in 2011. Bitcoin was obscure back then, and I figured had just enough name recognition to be a useful term for an interstellar currency: it'd clue people in that it was a networked digital currency.
Researchers have pointed out at a "trend towards centralization". Although bitcoin can be sent directly from user to user, in practice intermediaries are widely used.[32]:220–222 Bitcoin miners join large mining pools to minimize the variance of their income.[32]:215, 219–222[115]:3[116] Because transactions on the network are confirmed by miners, decentralization of the network requires that no single miner or mining pool obtains 51% of the hashing power, which would allow them to double-spend coins, prevent certain transactions from being verified and prevent other miners from earning income.[117] As of 2013 just six mining pools controlled 75% of overall bitcoin hashing power.[117] In 2014 mining pool Ghash.io obtained 51% hashing power which raised significant controversies about the safety of the network. The pool has voluntarily capped their hashing power at 39.99% and requested other pools to act responsibly for the benefit of the whole network.[118] Between 2017 and 2019 over 70% of the hashing power and 90% of transactions were operating from China.[119]
Ethereum blockchain applications are usually referred to as DApps (decentralized application), since they are based on the decentralized Ethereum Virtual Machine, and its smart contracts.[46] Many uses have been proposed for Ethereum platform, including ones that are impossible or unfeasible.[47][33] Use case proposals have included finance, the internet-of-things, farm-to-table produce, electricity sourcing and pricing, and sports betting. Ethereum is (as of 2017) the leading blockchain platform for initial coin offering projects, with over 50% market share.
Ethereum was announced at the North American Bitcoin Conference in Miami, in January, 2014.[9] During the same time as the conference, a group of people rented a house in Miami Gavin Wood, Charles Hoskinson, and Anthony Di Iorio, a Torontonian who financed the project.[9] Di Iorio invited friend Joseph Lubin, who invited reporter Morgen Peck, to bear witness.[9] Six months later the founders met again in a house in Zug Switzerland, where Buterin told the founders that the project would proceed as a non-profit. Hoskinson left the project at that time.[9]
Both blockchains have the same features and are identical in every way up to a certain block where the hard-fork was implemented. This means that everything that happened on Ethereum up until the hard-fork is still valid on the Ethereum Classic Blockchain. From the block where the hard fork or change in code was executed onwards, the two blockchains act individually.
×