Several news outlets have asserted that the popularity of bitcoins hinges on the ability to use them to purchase illegal goods.[135][222] Nobel-prize winning economist Joseph Stiglitz says that bitcoin's anonymity encourages money laundering and other crimes, "If you open up a hole like bitcoin, then all the nefarious activity will go through that hole, and no government can allow that." He's also said that if "you regulate it so you couldn't engage in money laundering and all these other [crimes], there will be no demand for Bitcoin. By regulating the abuses, you are going to regulate it out of existence. It exists because of the abuses."[223][224] 

The price of bitcoins has gone through cycles of appreciation and depreciation referred to by some as bubbles and busts.[159] In 2011, the value of one bitcoin rapidly rose from about US$0.30 to US$32 before returning to US$2.[160] In the latter half of 2012 and during the 2012–13 Cypriot financial crisis, the bitcoin price began to rise,[161] reaching a high of US$266 on 10 April 2013, before crashing to around US$50. On 29 November 2013, the cost of one bitcoin rose to a peak of US$1,242.[162] In 2014, the price fell sharply, and as of April remained depressed at little more than half 2013 prices. As of August 2014 it was under US$600.[163] During their time as bitcoin developers, Gavin Andresen[164] and Mike Hearn[165] warned that bubbles may occur.

طرح شخص أطلق على نفسه الاسم الرمزي ساتوشي ناكاموتو فكرة بيتكوين للمرة الأولى في ورقة بحثية في عام 2008،[2] ووصفها بأنها نظام نقدي إلكتروني يعتمد في التعاملات المالية على مبدأ الند للند (بالإنجليزية: Peer-to-Peer) ، وهو مصطلح تقني يعني التعامل المباشر بين مستخدم وآخر دون وجود وسيط (كالتورنت). يقول القائمون على بيتكوين إن الهدف من هذه العملة التي طرحت للتداول للمرة الأولى سنة 2009 [3] هو تغيير الاقتصاد العالمي بنفس الطريقة التي غيرت بها الويب أساليب النشر.[4] وفي عام 2016 أعلن رجل الأعمال الأسترالي كريغ رايت أنه هو ساتوشي ناكاموتو مقدما دليلا تقنيا على ذلك ولكن تم كشف زيف أدلّته بسهولة.[5]


If the private key is lost, the bitcoin network will not recognize any other evidence of ownership;[32] the coins are then unusable, and effectively lost. For example, in 2013 one user claimed to have lost 7,500 bitcoins, worth $7.5 million at the time, when he accidentally discarded a hard drive containing his private key.[78] About 20% of all bitcoins are believed to be lost. They would have a market value of about $20 billion at July 2018 prices.[79]

“A DAO consists of one or more contracts and could be funded by a group of like-minded individuals. A DAO operates completely transparently and completely independently of any human intervention, including its original creators. A DAO will stay on the network as long as it covers its survival costs and provides a useful service to its customer base” Stephen Tual, Slock.it Founder, former CCO Ethereum.
Another type of physical wallet called a hardware wallet keeps credentials offline while facilitating transactions.[106] The hardware wallet acts as a computer peripheral and signs transactions as requested by the user, who must press a button on the wallet to confirm that they intended to make the transaction. Hardware wallets never expose their private keys, keeping bitcoins in cold storage even when used with computers that may be compromised by malware.[99]:42–45

^ Jump up to: a b c d "Statement of Jennifer Shasky Calvery, Director Financial Crimes Enforcement Network United States Department of the Treasury Before the United States Senate Committee on Banking, Housing, and Urban Affairs Subcommittee on National Security and International Trade and Finance Subcommittee on Economic Policy" (PDF). fincen.gov. Financial Crimes Enforcement Network. 19 November 2013. Archived (PDF) from the original on 9 October 2016. Retrieved 1 June 2014.
Here’s why. Ethereum is based on blockchain technology where all transactions are meant to be irreversible and unchangeable. By executing a hard fork and rewriting the rules by which the blockchain executes, Ethereum set a dangerous precedent that goes against the very essence of blockchain. If the blockchain is changed every time a large enough amount of money is involved, or enough people get negatively impacted, the blockchain will lose its main value proposition – secure, anonymous, tamper proof & unchangeable.

As with other cryptocurrencies, the validity of each ether is provided by a blockchain, which is a continuously growing list of records, called blocks, which are linked and secured using cryptography.[30][31] By design, the blockchain is inherently resistant to modification of the data. It is an open, distributed ledger that records transactions between two parties efficiently and in a verifiable and permanent way.[32] Unlike Bitcoin, Ethereum operates using accounts and balances in a manner called state transitions. This does not rely upon unspent transaction outputs (UTXOs). State denotes the current balances of all accounts and extra data. State is not stored on the blockchain, it is stored in a separate Merkle Patricia tree. A cryptocurrency wallet stores the public and private "keys" or "addresses" which can be used to receive or spend ether. These can be generated through BIP 39 style mnemonics for a BIP 32 "HD Wallet". In Ethereum, this is unnecessary as it does not operate in a UTXO scheme. With the private key, it is possible to write in the blockchain, effectively making an ether transaction.


It takes a (global) village to raise a blockchain. The live network and the community of open source developers contribute significantly to this effort. They continuously refine and harden the Ethereum platform, helping it get faster at responding to industry demands for the value propositions it offers. These investments of time and resources speak to their faith in Ethereum governance and the value that businesses and developers see in its capabilities. – Joseph Lubin, CEO of Consensys
بروتوكول التوجيه بين البوابات (BGP)   بروتوكول التهيئة الآليّة للمضيفين (DHCP) بروتوكول التطبيقات المقيدة (CoAP) نظام أسماء النطاقات (DNS) بروتوكول نقل النصّ الفائق (HTTP) بروتوكول الوصول إلى رسائل الإنترنت (IMAP) بروتوكول النفاذ إلى الدليل البسيط (LDAP) برتوكول نقل أخبار الشبكة (NNTP) بروتوكول التوقيت في الشبكة (NTP) بروتوكول مكتب البريد (POP) بروتوكول معلومات التوجيه (RIP) بروتوكول التدفق في الزمن حقيقي (RTSP) بروتوكول وصف الجلسة (SDP) بروتوكول بدء جلسة (SIP) بروتوكول نقل الملفات (FTP) بروتوكول نقل الملفات البسيط (TFTP) بروتوكول إرسال البريد البسيط (SMTP) بروتوكول إدارة الشبكات البسيط (SNMP) بروتوكول الاتصال الآمن (SSH) بروتوكول تل نت (Telnet) سبيدي (SPDY) مزيد ..
×