حاليا لا يُملك مالكو عملات بيتكوين خيارات كثيرة لإنفاق أموالهم من خلالها، وهو ما يدفع ببعضهم إلى استبدالها مقابل العملات التقليدية. يتم ذلك عادة عبر منصات خاصة بذلك حيث يتم استبدال البيتكوينات مع مُستخدمين آخرين لها. يبدو أنه وفي حال ما إذا رغبت الحكومات في معرفة هويات أصحاب بعض الحسابات فما عليها سوى أن تقوم بتقنين عمليات التحويل بدل منعها، حيث سيصبح بالإمكان معرفة اسم صاحب كل حساب بُمجرد أن يرغب في استبدال ما بحوزته مقابل عملات تقليدية، وهو ما يُمثل نقطة انطلاق لتتبع الأموال المسروقة.
To lower the costs, bitcoin miners have set up in places like Iceland where geothermal energy is cheap and cooling Arctic air is free.[205] Bitcoin miners are known to use hydroelectric power in Tibet, Quebec, Washington (state), and Austria to reduce electricity costs.[204][206] Miners are attracted to suppliers such as Hydro Quebec that have energy surpluses.[207] According to a University of Cambridge study, much of bitcoin mining is done in China, where electricity is subsidized by the government.[208][209]
Researchers have pointed out at a "trend towards centralization". Although bitcoin can be sent directly from user to user, in practice intermediaries are widely used.[32]:220–222 Bitcoin miners join large mining pools to minimize the variance of their income.[32]:215, 219–222[115]:3[116] Because transactions on the network are confirmed by miners, decentralization of the network requires that no single miner or mining pool obtains 51% of the hashing power, which would allow them to double-spend coins, prevent certain transactions from being verified and prevent other miners from earning income.[117] As of 2013 just six mining pools controlled 75% of overall bitcoin hashing power.[117] In 2014 mining pool Ghash.io obtained 51% hashing power which raised significant controversies about the safety of the network. The pool has voluntarily capped their hashing power at 39.99% and requested other pools to act responsibly for the benefit of the whole network.[118] Between 2017 and 2019 over 70% of the hashing power and 90% of transactions were operating from China.[119]
On 1 August 2017, a hard fork of bitcoin was created, known as Bitcoin Cash.[111] Bitcoin Cash has a larger block size limit and had an identical blockchain at the time of fork. On 24 October 2017 another hard fork, Bitcoin Gold, was created. Bitcoin Gold changes the proof-of-work algorithm used in mining, as the developers felt that mining had become too specialized.[112]
Despite bringing a number of benefits, decentralized applications aren’t faultless. Because smart contract code is written by humans, smart contracts are only as good as the people who write them. Code bugs or oversights can lead to unintended adverse actions being taken. If a mistake in the code gets exploited, there is no efficient way in which an attack or exploitation can be stopped other than obtaining a network consensus and rewriting the underlying code. This goes against the essence of the blockchain which is meant to be immutable. Also, any action taken by a central party raises serious questions about the decentralized nature of an application.
Transactions are defined using a Forth-like scripting language.[7]:ch. 5 Transactions consist of one or more inputs and one or more outputs. When a user sends bitcoins, the user designates each address and the amount of bitcoin being sent to that address in an output. To prevent double spending, each input must refer to a previous unspent output in the blockchain.[77] The use of multiple inputs corresponds to the use of multiple coins in a cash transaction. Since transactions can have multiple outputs, users can send bitcoins to multiple recipients in one transaction. As in a cash transaction, the sum of inputs (coins used to pay) can exceed the intended sum of payments. In such a case, an additional output is used, returning the change back to the payer.[77] Any input satoshis not accounted for in the transaction outputs become the transaction fee.[77]
• لا حرج من دفع عمولات تحويل العملات: كما هو شائع بالنسبة للبعض أن دفع العُمولات عبر شبكات الإنترنت مقابل خدمات تحويل أو شراء عُملات البيتكوين يُعد شكل من أشكال الربا غير المسموح بها. لكن إستناداُ إلى ما تم ذكره بحسب الفتوى رقم 259576 أن لا هناك أى حرج على دفع مثل هذه العمولات. حيث إنك تدفع مُقابل حصولك على خدمة معينة بما فيها خدمات تحويل وشراء عُملات البيتكوين الإفتراضية.
Transactions are verified by network nodes through cryptography and recorded in a public distributed ledger called a blockchain. Bitcoin was invented by an unknown person or group of people using the name Satoshi Nakamoto[10] and was released as open-source software in 2009.[11] Bitcoins are created as a reward for a process known as mining. They can be exchanged for other currencies, products, and services.[12] Research produced by University of Cambridge estimates that in 2017, there were 2.9 to 5.8 million unique users using a cryptocurrency wallet, most of them using bitcoin.[13]

There are many ways you can plug into the Ethereum network, one of the easiest ways is to use its native Mist browser. Mist provides a user-friendly interface & digital wallet for users to trade & store Ether as well as write, manage, deploy and use smart contracts. Like web browsers give access and help people navigate the internet, Mist provides a portal into the world of decentralized blockchain applications.


Ethereum's smart contracts are based on different computer languages, which developers use to program their own functionalities. Smart contracts are high-level programming abstractions that are compiled down to EVM bytecode and deployed to the Ethereum blockchain for execution. They can be written in Solidity (a language library with similarities to C and JavaScript), Serpent (similar to Python, but deprecated), LLL (a low-level Lisp-like language), and Mutan (Go-based, but deprecated). There is also a research-oriented language under development called Vyper (a strongly-typed Python-derived decidable language).
In September 2015, the establishment of the peer-reviewed academic journal Ledger (ISSN 2379-5980) was announced. It covers studies of cryptocurrencies and related technologies, and is published by the University of Pittsburgh.[231] The journal encourages authors to digitally sign a file hash of submitted papers, which will then be timestamped into the bitcoin blockchain. Authors are also asked to include a personal bitcoin address in the first page of their papers.[232][233]
Cameron and Tyler Winklevoss, the founders of the Gemini Trust Co. exchange, reported that they had cut their paper wallets into pieces and stored them in envelopes distributed to safe deposit boxes across the United States.[101] Through this system, the theft of one envelope would neither allow the thief to steal any bitcoins nor deprive the rightful owners of their access to them.[100]
Researchers have pointed out at a "trend towards centralization". Although bitcoin can be sent directly from user to user, in practice intermediaries are widely used.[32]:220–222 Bitcoin miners join large mining pools to minimize the variance of their income.[32]:215, 219–222[115]:3[116] Because transactions on the network are confirmed by miners, decentralization of the network requires that no single miner or mining pool obtains 51% of the hashing power, which would allow them to double-spend coins, prevent certain transactions from being verified and prevent other miners from earning income.[117] As of 2013 just six mining pools controlled 75% of overall bitcoin hashing power.[117] In 2014 mining pool Ghash.io obtained 51% hashing power which raised significant controversies about the safety of the network. The pool has voluntarily capped their hashing power at 39.99% and requested other pools to act responsibly for the benefit of the whole network.[118] Between 2017 and 2019 over 70% of the hashing power and 90% of transactions were operating from China.[119]
الجدير بالذكر بأن بعض المواقع كانت تنشر سابقا تقديرا لمقدار الخسارة/ الربح الذي يُسجله المنقبون لكن يبدو بأنهم توقفوا عن القيام بذلك لأسباب نجهلها. قد يعتقد البعض بأنه لم يكن بالإمكان إعطاء تقدير دقيق لمقدار الخسارة أو الربح الذي يُسجله المنقبون، ولذلك تم التخلص من ذلك. إلا أنه من المُمكن جدا أنه تم التخلص من ذلك لكيلا يتم تنفير المُنقبين من عمليات التنقيب.

• الطبيعة الإنكماشية لعُملات البيتكوين: كما ذُكر أيضاُ عبر موقع الفتاوى  أن عُملات البيتكوين مثلها مثل أى عُملة آخرى لها طبيعة إنكماشية. نقصد بالطبيعة الإنكماشية هو التذبذب في الأسعار ما بين إرتفاع للقيمة السعرية وإنخفاض للقيمة السعرية بُناء على الحالة الإقتصادية العالمية ومدى إقبال الجمهور المُتعامل معها على شراء أو بيع العُملة. وهذا يدل على مصداقية العُملة وخضوعها لتغيرات السوق والعُملاء مثلها مثل سوق الذهب بالضبط.

تُعتبر بيتكوين عُملة معمّاة (بالإنجليزية: cryptocurrency) ويُقصد بذلك أنها تعتمد بشكل أساسي على مبادئ التشفير في جميع جوانبها، كما أنها تُعتبر أيضا العُملة الأولى من نوعها والأكثر شهرة وانتشارًا لكن رغم ذلك ليست العُملة التشفيرية الوحيدة الموجودة على شبكة الإنترنت حاليًا. حيث يتوفر ما يزيد عن 60 عُملة تشفيرية مُختلفة[6] منها 6 عُملات يُمكن وصفها بالرئيسية [7] وذلك اعتمادًا على عدد المُستخدمين وبنية كل شبكة، إضافة إلى الأماكن التي يُمكن استبدال وشراء هذه العُملات التشفيرية مُقابل عُملات أخرى. جميع العُملات التشفيرية الحالية مبنية على مبدأ عمل عُملة بيتكوين نفسها باستثناء عُملة Ripple [8]، وبما أن عُملة بيتكوين مفتوحة المصدر فإنه من المُمكن استنساخها وإدخال بعض التعديلات عليها ومن ثم إطلاق عُملة جديدة.
The use of bitcoin by criminals has attracted the attention of financial regulators, legislative bodies, law enforcement, and the media.[218] In the United States, the FBI prepared an intelligence assessment,[219] the SEC issued a pointed warning about investment schemes using virtual currencies,[218] and the U.S. Senate held a hearing on virtual currencies in November 2013.[220] The U.S. government claimed that bitcoin was used to facilitate payments related to Russian interference in the 2016 United States elections.[221]
As with other cryptocurrencies, the validity of each ether is provided by a blockchain, which is a continuously growing list of records, called blocks, which are linked and secured using cryptography.[30][31] By design, the blockchain is inherently resistant to modification of the data. It is an open, distributed ledger that records transactions between two parties efficiently and in a verifiable and permanent way.[32] Unlike Bitcoin, Ethereum operates using accounts and balances in a manner called state transitions. This does not rely upon unspent transaction outputs (UTXOs). State denotes the current balances of all accounts and extra data. State is not stored on the blockchain, it is stored in a separate Merkle Patricia tree. A cryptocurrency wallet stores the public and private "keys" or "addresses" which can be used to receive or spend ether. These can be generated through BIP 39 style mnemonics for a BIP 32 "HD Wallet". In Ethereum, this is unnecessary as it does not operate in a UTXO scheme. With the private key, it is possible to write in the blockchain, effectively making an ether transaction.

بروتوكول التوجيه بين البوابات (BGP)   بروتوكول التهيئة الآليّة للمضيفين (DHCP) بروتوكول التطبيقات المقيدة (CoAP) نظام أسماء النطاقات (DNS) بروتوكول نقل النصّ الفائق (HTTP) بروتوكول الوصول إلى رسائل الإنترنت (IMAP) بروتوكول النفاذ إلى الدليل البسيط (LDAP) برتوكول نقل أخبار الشبكة (NNTP) بروتوكول التوقيت في الشبكة (NTP) بروتوكول مكتب البريد (POP) بروتوكول معلومات التوجيه (RIP) بروتوكول التدفق في الزمن حقيقي (RTSP) بروتوكول وصف الجلسة (SDP) بروتوكول بدء جلسة (SIP) بروتوكول نقل الملفات (FTP) بروتوكول نقل الملفات البسيط (TFTP) بروتوكول إرسال البريد البسيط (SMTP) بروتوكول إدارة الشبكات البسيط (SNMP) بروتوكول الاتصال الآمن (SSH) بروتوكول تل نت (Telnet) سبيدي (SPDY) مزيد ..
The rapid price increase of Ethereum has not only attracted investors but developers too. Ethereum has tens of thousands of developers in its open source community, each contributing to the many layers of the “Ethereum stack”. This includes code contributions to the core Ethereum clients, second layer scaling tech and the “decentralized applications” (dApps) that are built on top of the platform. The appeal of Ethereum to developers is unique in that it was the first platform to allow anyone in the world to write and deploy code that would run without the risk of censorship. The community of developers which have formed around these core principles have led to the creation of technologies that could not have existed without the inception of Ethereum, many of which were never predicted. Some of the major use-cases of Ethereum so far have been:
Bitcoin is pseudonymous, meaning that funds are not tied to real-world entities but rather bitcoin addresses. Owners of bitcoin addresses are not explicitly identified, but all transactions on the blockchain are public. In addition, transactions can be linked to individuals and companies through "idioms of use" (e.g., transactions that spend coins from multiple inputs indicate that the inputs may have a common owner) and corroborating public transaction data with known information on owners of certain addresses.[120] Additionally, bitcoin exchanges, where bitcoins are traded for traditional currencies, may be required by law to collect personal information.[121] To heighten financial privacy, a new bitcoin address can be generated for each transaction.[122] 

Network nodes can validate transactions, add them to their copy of the ledger, and then broadcast these ledger additions to other nodes. To achieve independent verification of the chain of ownership each network node stores its own copy of the blockchain.[76] About every 10 minutes, a new group of accepted transactions, called a block, is created, added to the blockchain, and quickly published to all nodes, without requiring central oversight. This allows bitcoin software to determine when a particular bitcoin was spent, which is needed to prevent double-spending. A conventional ledger records the transfers of actual bills or promissory notes that exist apart from it, but the blockchain is the only place that bitcoins can be said to exist in the form of unspent outputs of transactions.[7]:ch. 5

Bitcoin (BTC) is known as the first open-source, peer-to-peer, digital cryptocurrency that was developed and released by a group of unknown independent programmers named Satoshi Nakamoto in 2008. Cryptocoin doesn’t have any centralized server used for its issuing, transactions and storing, as it uses a distributed network public database technology named blockchain, which requires an electronic signature and is supported by a proof-of-work protocol to provide the security and legitimacy of money transactions. The issuing of Bitcoin is done by users with mining capabilities and is limited to 21 million coins. Currently, Bitcoin’s market cap surpasses $138 billion and this is the most popular kind of digital currency. Buying and selling cryptocurrency is available through special Bitcoin exchange platforms or ATMs.
Researchers have pointed out at a "trend towards centralization". Although bitcoin can be sent directly from user to user, in practice intermediaries are widely used.[32]:220–222 Bitcoin miners join large mining pools to minimize the variance of their income.[32]:215, 219–222[115]:3[116] Because transactions on the network are confirmed by miners, decentralization of the network requires that no single miner or mining pool obtains 51% of the hashing power, which would allow them to double-spend coins, prevent certain transactions from being verified and prevent other miners from earning income.[117] As of 2013 just six mining pools controlled 75% of overall bitcoin hashing power.[117] In 2014 mining pool Ghash.io obtained 51% hashing power which raised significant controversies about the safety of the network. The pool has voluntarily capped their hashing power at 39.99% and requested other pools to act responsibly for the benefit of the whole network.[118] Between 2017 and 2019 over 70% of the hashing power and 90% of transactions were operating from China.[119]
Despite bringing a number of benefits, decentralized applications aren’t faultless. Because smart contract code is written by humans, smart contracts are only as good as the people who write them. Code bugs or oversights can lead to unintended adverse actions being taken. If a mistake in the code gets exploited, there is no efficient way in which an attack or exploitation can be stopped other than obtaining a network consensus and rewriting the underlying code. This goes against the essence of the blockchain which is meant to be immutable. Also, any action taken by a central party raises serious questions about the decentralized nature of an application.
The proof-of-work system, alongside the chaining of blocks, makes modifications of the blockchain extremely hard, as an attacker must modify all subsequent blocks in order for the modifications of one block to be accepted.[87] As new blocks are mined all the time, the difficulty of modifying a block increases as time passes and the number of subsequent blocks (also called confirmations of the given block) increases.[75]
• الطبيعة الإنكماشية لعُملات البيتكوين: كما ذُكر أيضاُ عبر موقع الفتاوى  أن عُملات البيتكوين مثلها مثل أى عُملة آخرى لها طبيعة إنكماشية. نقصد بالطبيعة الإنكماشية هو التذبذب في الأسعار ما بين إرتفاع للقيمة السعرية وإنخفاض للقيمة السعرية بُناء على الحالة الإقتصادية العالمية ومدى إقبال الجمهور المُتعامل معها على شراء أو بيع العُملة. وهذا يدل على مصداقية العُملة وخضوعها لتغيرات السوق والعُملاء مثلها مثل سوق الذهب بالضبط.
×