^ Jump up to: a b c d "Statement of Jennifer Shasky Calvery, Director Financial Crimes Enforcement Network United States Department of the Treasury Before the United States Senate Committee on Banking, Housing, and Urban Affairs Subcommittee on National Security and International Trade and Finance Subcommittee on Economic Policy" (PDF). fincen.gov. Financial Crimes Enforcement Network. 19 November 2013. Archived (PDF) from the original on 9 October 2016. Retrieved 1 June 2014.

• وسائل الحصول على عُملات البيتكوين: بُناء عى حكم الفتوى رقم: 231460 لدار الإفتاء، أكدت إنه إذا كان الحصول على هذه العُملات الإفتراضية مثل عمليات التعدين والتنقيب يتم بشكل سليم بعيد عن التلاعب والغش والسرقة والنصب، فيجوز إدراجها تحت بنود العُملات المُحللة. ولكن بشرط التقابض وهو ما يحدث مع تداول عُملات البيتكوين، كما أن الإستثمارات الناتجة من أرباح عمليات بيع وشراء البيتكوين من ضمن الأسباب التى تثبت تحليل عملات البيتكوين، حيث إنه إذا كُنت شخص سليم النية ستقوم بإستثمار أرباحك بما يُرضى الله ولأن الله أعلم بالنوايا ستُحتسب في ميزان حسناتك.
لنفرض بأن أغلب المُنقبين يستخدمون أجهزة تقارب في كفاءتها Radeon 5870 video card والتي يتم اعتبارها كإحدى أعلى البطاقات مردودية على هذا الموقع. بإمكان بطاقة Radeon 5870 أن تُنفذ 402 ميجا هاش في الثانية وتُكلف حوالي 1.2 دولار لليوم الواحد إن تم استخدامها على جهاز يحتوي بطاقتين من نفس النوع في الولايات المُتحدة أين يُمكن القول بأن سعر الكهرباء رخيص نسبيا. للوصول إلى النتيجة آنفة الذكر نحتاج إلى استخدام 14,164,898 جهاز بتكلفة $16,997,877 وهو ما يُمثل خسارة تُقدر بـ $13,072,014 يوميا للمُنقبين.
As the industry continues to investigate blockchain platforms, it’s apparent that Ethereum is becoming a de facto leader. For example, a few days ago JPMorgan publicly open-sourced its Quorum platform, architected and developed around the Go Ethereum client by Jeff Wilcke and his team. Several other major banks are using Ethereum, and Microsoft is anchoring its Bletchley platform on it as the foundational blockchain element. Industry, both publicly and confidentially, continues to contribute to Ethereum and work with us and others to help our promising, toddler-age codebase reach maturity. Stay tuned for news on this front. 

Another type of physical wallet called a hardware wallet keeps credentials offline while facilitating transactions.[106] The hardware wallet acts as a computer peripheral and signs transactions as requested by the user, who must press a button on the wallet to confirm that they intended to make the transaction. Hardware wallets never expose their private keys, keeping bitcoins in cold storage even when used with computers that may be compromised by malware.[99]:42–45
Augur is an open-source prediction & forecasting market platform that allows anyone to forecast events and get rewarded for predicting them correctly. Predictions on future real world events, like who will win the next US election, are carried out by trading virtual shares. If a person buys shares in a winning prediction, they receive monetary rewards.
The domain name "bitcoin.org" was registered on 18 August 2008.[17] On 31 October 2008, a link to a paper authored by Satoshi Nakamoto titled Bitcoin: A Peer-to-Peer Electronic Cash System[4] was posted to a cryptography mailing list.[18] Nakamoto implemented the bitcoin software as open-source code and released it in January 2009.[19][20][11] Nakamoto's identity remains unknown.[10]
Vitalik Buterin picked the name Ethereum after browsing Wikipedia articles about elements and science fiction, when he found the name, noting, "I immediately realized that I liked it better than all of the other alternatives that I had seen; I suppose it was the fact that sounded nice and it had the word 'ether', referring to the hypothetical invisible medium that permeates the universe and allows light to travel."[9]
تسمح تطبيقات بيتكوين والتي يُطلق عليها أحيانا اسم عميل بيتكوين للمُستخدمين بالتعامل مع شبكة بيتكوين. في شكله القاعدي يسمح التطبيق بتوليد وحفظ مفاتيح خاصة بالمُستخدم والاتصال بشبكة الند للند الخاص بالعُملة. تم إطلاق أول تطبيق بيتكوين سنة 2009 من طرف ساتوشي ناكاموتو مُؤسس عُملة بيتكوين كتطبيق مجاني ومفتوح المصدر. يُستخدم هذا التطبيق -والذي يُطلق عليه عادة اسم تطبيق ساتوشي- كمحفظة على الحواسيب الشخصية للقيام بعمليات دفع إلكترونية أو كخادوم لاستقبال تلك المدفوعات ولخدمات أخرى مُتعلقة بالدفع. أما تطبيق Bitcoin-Qt فيتم اعتباره كتطبيق مرجعي بحكم أنه يُمثل الآلية التي يعمل من خلالها بروتوكول بيتكوين ويُعتبر مثالا يُحتذى به لغيره من التطبيقات. لدى القيام بعمليات شراء باستخدام الهواتف الذكية فإنه عادة ما يتم استخدام تطبيقات بيتكوين تقوم بتوليد و/أو قراءة QR codes لتسهيل مهمة التحويل والدفع. كما تتوفر حاليا عدة تطبيقات تعمل كخواديم تقوم بتأكيد الإجراءات التي تتم على الشبكة وتقوم بإضافتها كتلة تحويلات.

Bitcoin has been criticized for the amount of electricity consumed by mining. As of 2015, The Economist estimated that even if all miners used modern facilities, the combined electricity consumption would be 166.7 megawatts (1.46 terawatt-hours per year).[136] At the end of 2017, the global bitcoin mining activity was estimated to consume between one and four gigawatts of electricity.[203] Politico noted that the even high-end estimates of bitcoin's total consumption levels amount to only about 6% of the total power consumed by the global banking sector, and even if bitcoin's consumption levels increased 100 fold from today's levels, bitcoin's consumption would still only amount to about 2% of global power consumption.[204]
Ethereum addresses are composed of the prefix "0x", a common identifier for hexadecimal, concatenated with the rightmost 20 bytes of the Keccak-256 hash (big endian) of the ECDSA public key (the curve used is the so called secp256k1, the same as Bitcoin). In hexadecimal, 2 digits represents a byte, meaning addresses contain 40 hexadecimal digits. An example of an Ethereum address is 0xb794F5eA0ba39494cE839613fffBA74279579268. Contract addresses are in the same format, however they are determined by sender and creation transaction nonce.[34] User accounts are indistinguishable from contract accounts given only an address for each and no blockchain data. Any valid Keccak-256 hash put into the described format is valid, even if it does not correspond to an account with a private key or a contract. This is unlike Bitcoin, which uses base58check to ensure that addresses are properly typed.
Blockchain analysts estimate that Nakamoto had mined about one million bitcoins[28] before disappearing in 2010, when he handed the network alert key and control of the code repository over to Gavin Andresen. Andresen later became lead developer at the Bitcoin Foundation.[29][30] Andresen then sought to decentralize control. This left opportunity for controversy to develop over the future development path of bitcoin, in contrast to the perceived authority of Nakamoto's contributions.[31][30]

Ether is a token whose blockchain is generated by the Ethereum platform. Ether can be transferred between accounts and used to compensate participant mining nodes for computations performed.[3] Ethereum provides a decentralized virtual machine, the Ethereum Virtual Machine (EVM), which can execute scripts using an international network of public nodes.[4] The virtual machine's instruction set, in contrast to others like Bitcoin Script, is thought to be Turing-complete. "Gas", an internal transaction pricing mechanism, is used to mitigate spam and allocate resources on the network.[4]


The receiver of the first bitcoin transaction was cypherpunk Hal Finney, who created the first reusable proof-of-work system (RPoW) in 2004.[24] Finney downloaded the bitcoin software on its release date, and on 12 January 2009 received ten bitcoins from Nakamoto.[25][26] Other early cypherpunk supporters were creators of bitcoin predecessors: Wei Dai, creator of b-money, and Nick Szabo, creator of bit gold.[21] In 2010, the first known commercial transaction using bitcoin occurred when programmer Laszlo Hanyecz bought two Papa John's pizzas for ₿10,000.[27]

Despite the fallout from The DAO hack, Ethereum is moving forward and looking to a bright future. By providing a user-friendly platform that enables people to harness the power of blockchain technology, Ethereum is speeding up the decentralization of the world economy. Decentralized applications have the potential to profoundly disrupt hundreds of industries including finance, real estate, academia, insurance, healthcare and the public sector amongst many others.
Network nodes can validate transactions, add them to their copy of the ledger, and then broadcast these ledger additions to other nodes. To achieve independent verification of the chain of ownership each network node stores its own copy of the blockchain.[76] About every 10 minutes, a new group of accepted transactions, called a block, is created, added to the blockchain, and quickly published to all nodes, without requiring central oversight. This allows bitcoin software to determine when a particular bitcoin was spent, which is needed to prevent double-spending. A conventional ledger records the transfers of actual bills or promissory notes that exist apart from it, but the blockchain is the only place that bitcoins can be said to exist in the form of unspent outputs of transactions.[7]:ch. 5
Izabella Kaminska, the editor of FT Alphaville, has pointed out that criminals are using Ethereum to run Ponzi schemes and other forms of investment fraud.[67] The article was based on a paper from the University of Cagliari, which placed the number of Ethereum smart contracts which facilitate Ponzi schemes at nearly 10% of 1384 smart contracts examined. However, it also estimated that only 0.05% of the transactions on the network were related to such contracts.[68]

The proof-of-work system, alongside the chaining of blocks, makes modifications of the blockchain extremely hard, as an attacker must modify all subsequent blocks in order for the modifications of one block to be accepted.[87] As new blocks are mined all the time, the difficulty of modifying a block increases as time passes and the number of subsequent blocks (also called confirmations of the given block) increases.[75]


Several news outlets have asserted that the popularity of bitcoins hinges on the ability to use them to purchase illegal goods.[135][222] Nobel-prize winning economist Joseph Stiglitz says that bitcoin's anonymity encourages money laundering and other crimes, "If you open up a hole like bitcoin, then all the nefarious activity will go through that hole, and no government can allow that." He's also said that if "you regulate it so you couldn't engage in money laundering and all these other [crimes], there will be no demand for Bitcoin. By regulating the abuses, you are going to regulate it out of existence. It exists because of the abuses."[223][224]
تسمح تطبيقات بيتكوين والتي يُطلق عليها أحيانا اسم عميل بيتكوين للمُستخدمين بالتعامل مع شبكة بيتكوين. في شكله القاعدي يسمح التطبيق بتوليد وحفظ مفاتيح خاصة بالمُستخدم والاتصال بشبكة الند للند الخاص بالعُملة. تم إطلاق أول تطبيق بيتكوين سنة 2009 من طرف ساتوشي ناكاموتو مُؤسس عُملة بيتكوين كتطبيق مجاني ومفتوح المصدر. يُستخدم هذا التطبيق -والذي يُطلق عليه عادة اسم تطبيق ساتوشي- كمحفظة على الحواسيب الشخصية للقيام بعمليات دفع إلكترونية أو كخادوم لاستقبال تلك المدفوعات ولخدمات أخرى مُتعلقة بالدفع. أما تطبيق Bitcoin-Qt فيتم اعتباره كتطبيق مرجعي بحكم أنه يُمثل الآلية التي يعمل من خلالها بروتوكول بيتكوين ويُعتبر مثالا يُحتذى به لغيره من التطبيقات. لدى القيام بعمليات شراء باستخدام الهواتف الذكية فإنه عادة ما يتم استخدام تطبيقات بيتكوين تقوم بتوليد و/أو قراءة QR codes لتسهيل مهمة التحويل والدفع. كما تتوفر حاليا عدة تطبيقات تعمل كخواديم تقوم بتأكيد الإجراءات التي تتم على الشبكة وتقوم بإضافتها كتلة تحويلات.

In the blockchain, bitcoins are registered to bitcoin addresses. Creating a bitcoin address requires nothing more than picking a random valid private key and computing the corresponding bitcoin address. This computation can be done in a split second. But the reverse, computing the private key of a given bitcoin address, is mathematically unfeasible. Users can tell others or make public a bitcoin address without compromising its corresponding private key. Moreover, the number of valid private keys is so vast that it is extremely unlikely someone will compute a key-pair that is already in use and has funds. The vast number of valid private keys makes it unfeasible that brute force could be used to compromise a private key. To be able to spend their bitcoins, the owner must know the corresponding private key and digitally sign the transaction. The network verifies the signature using the public key; the private key is never revealed.[7]:ch. 5


As with other cryptocurrencies, the validity of each ether is provided by a blockchain, which is a continuously growing list of records, called blocks, which are linked and secured using cryptography.[30][31] By design, the blockchain is inherently resistant to modification of the data. It is an open, distributed ledger that records transactions between two parties efficiently and in a verifiable and permanent way.[32] Unlike Bitcoin, Ethereum operates using accounts and balances in a manner called state transitions. This does not rely upon unspent transaction outputs (UTXOs). State denotes the current balances of all accounts and extra data. State is not stored on the blockchain, it is stored in a separate Merkle Patricia tree. A cryptocurrency wallet stores the public and private "keys" or "addresses" which can be used to receive or spend ether. These can be generated through BIP 39 style mnemonics for a BIP 32 "HD Wallet". In Ethereum, this is unnecessary as it does not operate in a UTXO scheme. With the private key, it is possible to write in the blockchain, effectively making an ether transaction.
تُعتبر بيتكوين عُملة معمّاة (بالإنجليزية: cryptocurrency) ويُقصد بذلك أنها تعتمد بشكل أساسي على مبادئ التشفير في جميع جوانبها، كما أنها تُعتبر أيضا العُملة الأولى من نوعها والأكثر شهرة وانتشارًا لكن رغم ذلك ليست العُملة التشفيرية الوحيدة الموجودة على شبكة الإنترنت حاليًا. حيث يتوفر ما يزيد عن 60 عُملة تشفيرية مُختلفة[6] منها 6 عُملات يُمكن وصفها بالرئيسية [7] وذلك اعتمادًا على عدد المُستخدمين وبنية كل شبكة، إضافة إلى الأماكن التي يُمكن استبدال وشراء هذه العُملات التشفيرية مُقابل عُملات أخرى. جميع العُملات التشفيرية الحالية مبنية على مبدأ عمل عُملة بيتكوين نفسها باستثناء عُملة Ripple [8]، وبما أن عُملة بيتكوين مفتوحة المصدر فإنه من المُمكن استنساخها وإدخال بعض التعديلات عليها ومن ثم إطلاق عُملة جديدة.
In Ethereum all smart contracts are stored publicly on every node of the blockchain, which has costs.[57] Being a blockchain means it is secure by design and is an example of a distributed computing system with high Byzantine fault tolerance. The downside is that performance issues arise in that every node is calculating all the smart contracts in real time, resulting in lower speeds.[57] As of January 2016, the Ethereum protocol could process about 25 transactions per second.[57] In comparison, the Visa payment platform processes 45,000 payments per second leading some to question the scalability of Ethereum.[58] On 19 December 2016, Ethereum exceeded one million transactions in a single day for the first time.[59]

Bitcoin prices were negatively affected by several hacks or thefts from cryptocurrency exchanges, including thefts from Coincheck in January 2018, Coinrail and Bithumb in June, and Bancor in July. For the first six months of 2018, $761 million worth of cryptocurrencies was reported stolen from exchanges.[64] Bitcoin's price was affected even though other cryptocurrencies were stolen at Coinrail and Bancor as investors worried about the security of cryptocurrency exchanges.[65][66][67]
تتمتع عملة البيتكوين بقدر عالٍ من السرية. مبدئيا الأمر صحيح، حيث أن كل ما تحتاجه لإرسال بعض البيتكوينات لشخص آخر هو عنوانه فقط. لكن بحكم أنه يتم تسجيل كل عملية تحويل في سجل بيتكوين فإنه بالرغم من عدم معرفتك لهوية مالك أي عُنوان إلا أنه بمقدورك أن تعرف كم عدد البيتكوينات التي في حوزته وما هي العناوين التي أرسلت بيتكوينات إليه. إن قام أحدهم بالإعلان صراحة عن امتلاكه لعناوين بيتكوين مُعينة فإنه سيُصبح بإمكانك معرفة ما هي العناوين التي قامت بإرسال بيتكوينات إليه وما هي العناوين التي أرسل إليها بيتكوينات. الكشف عن عنوان البيتكوين الخاص بك ليس مُستبعدا، حيث أنك ستحتاج إلى إعطائه لغيرك في حال ما إذا احتجت أن يرسلوا لك بعض المال إليه. يُنصح باستخدام عناوين مُختلفة لعمليات تحويل مُختلفة للحفاظ على مُستوى مُعين من المجهولية، رغم ذلك هناك الكثيرون ممن لا يقومون بذلك. من الناحية التقنية يبقى تتبع مصدر بعض العمليات المشبوهة على شبكة بيتكوين مُمكنا، حيث يكفي تتبع عمليات التحويل إلى غاية وصولها إلى عنوان معروفة هوية صاحبه، وحينها يكفي القيام بعمليات تحقيق عكسية إلى غاية الوصول إلى صاحب الحساب المشبوه. صحيح بأن كم البيانات المُتعلقة بجميع عمليات التحويل ضخم، إلا أن قوة الحواسيب في تزايد مُستمر وإمكانية تتبع هذه العمليات واردة جدا، بل ويُمكن الجزم بأنه تتبع عمليات سرقة البيتكوينات أسهل بكثير من تتبع سرقة الأموال على هيئتها الورقية.
Ethereum is also being used as a platform to launch other cryptocurrencies. Because of the ERC20 token standard defined by the Ethereum Foundation, other developers can issue their own versions of this token and raise funds with an initial coin offering (ICO). In this fundraising strategy, the issuers of the token set an amount they want to raise, offer it in a crowdsale, and receive Ether in exchange. Billions of dollars have been raised by ICOs on the Ethereum platform in the last two years, and one of the most valuable cryptocurrencies in the world, EOS, is an ERC20 token.

Bloomberg reported that the largest 17 crypto merchant-processing services handled $69 million in June 2018, down from $411 million in September 2017. Bitcoin is "not actually usable" for retail transactions because of high costs and the inability to process chargebacks, according to Nicholas Weaver, a researcher quoted by Bloomberg. High price volatility and transaction fees make paying for small retail purchases with bitcoin impractical, according to economist Kim Grauer. However, bitcoin continues to be used for large-item purchases on sites such as Overstock.com, and for cross-border payments to freelancers and other vendors.[141]

“A DAO consists of one or more contracts and could be funded by a group of like-minded individuals. A DAO operates completely transparently and completely independently of any human intervention, including its original creators. A DAO will stay on the network as long as it covers its survival costs and provides a useful service to its customer base” Stephen Tual, Slock.it Founder, former CCO Ethereum.


Third-party internet services called online wallets offer similar functionality but may be easier to use. In this case, credentials to access funds are stored with the online wallet provider rather than on the user's hardware.[97] As a result, the user must have complete trust in the online wallet provider. A malicious provider or a breach in server security may cause entrusted bitcoins to be stolen. An example of such a security breach occurred with Mt. Gox in 2011.[98]
Bitcoin (BTC) is known as the first open-source, peer-to-peer, digital cryptocurrency that was developed and released by a group of unknown independent programmers named Satoshi Nakamoto in 2008. Cryptocoin doesn’t have any centralized server used for its issuing, transactions and storing, as it uses a distributed network public database technology named blockchain, which requires an electronic signature and is supported by a proof-of-work protocol to provide the security and legitimacy of money transactions. The issuing of Bitcoin is done by users with mining capabilities and is limited to 21 million coins. Currently, Bitcoin’s market cap surpasses $138 billion and this is the most popular kind of digital currency. Buying and selling cryptocurrency is available through special Bitcoin exchange platforms or ATMs.
Despite bringing a number of benefits, decentralized applications aren’t faultless. Because smart contract code is written by humans, smart contracts are only as good as the people who write them. Code bugs or oversights can lead to unintended adverse actions being taken. If a mistake in the code gets exploited, there is no efficient way in which an attack or exploitation can be stopped other than obtaining a network consensus and rewriting the underlying code. This goes against the essence of the blockchain which is meant to be immutable. Also, any action taken by a central party raises serious questions about the decentralized nature of an application.

Here’s why. Ethereum is based on blockchain technology where all transactions are meant to be irreversible and unchangeable. By executing a hard fork and rewriting the rules by which the blockchain executes, Ethereum set a dangerous precedent that goes against the very essence of blockchain. If the blockchain is changed every time a large enough amount of money is involved, or enough people get negatively impacted, the blockchain will lose its main value proposition – secure, anonymous, tamper proof & unchangeable.


Here’s why. Ethereum is based on blockchain technology where all transactions are meant to be irreversible and unchangeable. By executing a hard fork and rewriting the rules by which the blockchain executes, Ethereum set a dangerous precedent that goes against the very essence of blockchain. If the blockchain is changed every time a large enough amount of money is involved, or enough people get negatively impacted, the blockchain will lose its main value proposition – secure, anonymous, tamper proof & unchangeable. 

^ Beikverdi, A.; Song, J. (June 2015). Trend of centralization in Bitcoin's distributed network. 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD). pp. 1–6. doi:10.1109/SNPD.2015.7176229. ISBN 978-1-4799-8676-7. Archived from the original on 26 January 2018.
If the private key is lost, the bitcoin network will not recognize any other evidence of ownership;[32] the coins are then unusable, and effectively lost. For example, in 2013 one user claimed to have lost 7,500 bitcoins, worth $7.5 million at the time, when he accidentally discarded a hard drive containing his private key.[78] About 20% of all bitcoins are believed to be lost. They would have a market value of about $20 billion at July 2018 prices.[79]
Bitcoin prices were negatively affected by several hacks or thefts from cryptocurrency exchanges, including thefts from Coincheck in January 2018, Coinrail and Bithumb in June, and Bancor in July. For the first six months of 2018, $761 million worth of cryptocurrencies was reported stolen from exchanges.[64] Bitcoin's price was affected even though other cryptocurrencies were stolen at Coinrail and Bancor as investors worried about the security of cryptocurrency exchanges.[65][66][67]

Ethereum was initially described in a white paper by Vitalik Buterin,[10] a programmer involved with Bitcoin Magazine, in late 2013 with a goal of building decentralized applications.[11][12] Buterin had argued that Bitcoin needed a scripting language for application development. Failing to gain agreement, he proposed development of a new platform with a more general scripting language.[4]:88
Ethereum was initially described in a white paper by Vitalik Buterin,[10] a programmer involved with Bitcoin Magazine, in late 2013 with a goal of building decentralized applications.[11][12] Buterin had argued that Bitcoin needed a scripting language for application development. Failing to gain agreement, he proposed development of a new platform with a more general scripting language.[4]:88
×