تسمح تطبيقات بيتكوين والتي يُطلق عليها أحيانا اسم عميل بيتكوين للمُستخدمين بالتعامل مع شبكة بيتكوين. في شكله القاعدي يسمح التطبيق بتوليد وحفظ مفاتيح خاصة بالمُستخدم والاتصال بشبكة الند للند الخاص بالعُملة. تم إطلاق أول تطبيق بيتكوين سنة 2009 من طرف ساتوشي ناكاموتو مُؤسس عُملة بيتكوين كتطبيق مجاني ومفتوح المصدر. يُستخدم هذا التطبيق -والذي يُطلق عليه عادة اسم تطبيق ساتوشي- كمحفظة على الحواسيب الشخصية للقيام بعمليات دفع إلكترونية أو كخادوم لاستقبال تلك المدفوعات ولخدمات أخرى مُتعلقة بالدفع. أما تطبيق Bitcoin-Qt فيتم اعتباره كتطبيق مرجعي بحكم أنه يُمثل الآلية التي يعمل من خلالها بروتوكول بيتكوين ويُعتبر مثالا يُحتذى به لغيره من التطبيقات. لدى القيام بعمليات شراء باستخدام الهواتف الذكية فإنه عادة ما يتم استخدام تطبيقات بيتكوين تقوم بتوليد و/أو قراءة QR codes لتسهيل مهمة التحويل والدفع. كما تتوفر حاليا عدة تطبيقات تعمل كخواديم تقوم بتأكيد الإجراءات التي تتم على الشبكة وتقوم بإضافتها كتلة تحويلات.
^ Chan, Edwin. "China Plans to Ban Cryptocurrency Mining in Renewed Clampdown". www.bloomberg.com. Retrieved 10 April 2019. While China was once home to about 70 percent of Bitcoin mining and 90 percent of trades, authorities have waged a nearly two-year campaign to shrink the crypto industry amid concerns over speculative bubbles, fraud and wasteful energy consumption.
In the blockchain, bitcoins are registered to bitcoin addresses. Creating a bitcoin address requires nothing more than picking a random valid private key and computing the corresponding bitcoin address. This computation can be done in a split second. But the reverse, computing the private key of a given bitcoin address, is mathematically unfeasible. Users can tell others or make public a bitcoin address without compromising its corresponding private key. Moreover, the number of valid private keys is so vast that it is extremely unlikely someone will compute a key-pair that is already in use and has funds. The vast number of valid private keys makes it unfeasible that brute force could be used to compromise a private key. To be able to spend their bitcoins, the owner must know the corresponding private key and digitally sign the transaction. The network verifies the signature using the public key; the private key is never revealed.[7]:ch. 5
Ethereum is also being used as a platform to launch other cryptocurrencies. Because of the ERC20 token standard defined by the Ethereum Foundation, other developers can issue their own versions of this token and raise funds with an initial coin offering (ICO). In this fundraising strategy, the issuers of the token set an amount they want to raise, offer it in a crowdsale, and receive Ether in exchange. Billions of dollars have been raised by ICOs on the Ethereum platform in the last two years, and one of the most valuable cryptocurrencies in the world, EOS, is an ERC20 token.
Both blockchains have the same features and are identical in every way up to a certain block where the hard-fork was implemented. This means that everything that happened on Ethereum up until the hard-fork is still valid on the Ethereum Classic Blockchain. From the block where the hard fork or change in code was executed onwards, the two blockchains act individually.

Ethereum has recently created a new standard called the ERC721 token for tracking unique digital assets. One of the biggest use cases currently for such tokens is digital collectibles, as the infrastructure allows for people to prove ownership of scarce digital goods. Many games are currently being built using this technology, such as the overnight hit CryptoKitties, a game where you can collect and breed digital cats.

In Charles Stross' 2013 science fiction novel, Neptune's Brood, the universal interstellar payment system is known as "bitcoin" and operates using cryptography.[227] Stross later blogged that the reference was intentional, saying "I wrote Neptune's Brood in 2011. Bitcoin was obscure back then, and I figured had just enough name recognition to be a useful term for an interstellar currency: it'd clue people in that it was a networked digital currency."[228]
^ Jump up to: a b c d e Joshua A. Kroll; Ian C. Davey; Edward W. Felten (11–12 June 2013). "The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries" (PDF). The Twelfth Workshop on the Economics of Information Security (WEIS 2013). Archived (PDF) from the original on 9 May 2016. Retrieved 26 April 2016. A transaction fee is like a tip or gratuity left for the miner.
×