After much debate, the Ethereum community voted and decided to retrieve the stolen funds by executing what’s known as a hard fork or a change in code. The hard fork moved the stolen funds to a new smart contract designed to let the original owners withdraw their tokens. But this is where things get complicated. The implications of this decision are controversial and the topic of intense debate.
Leveraged trading in foreign currency or off-exchange products on margin carries significant risk and may not be suitable for all investors. We advise you to carefully consider whether trading is appropriate for you based on your personal circumstances. Forex trading involves risk. Losses can exceed deposits. We recommend that you seek independent advice and ensure you fully understand the risks involved before trading. 

The domain name "bitcoin.org" was registered on 18 August 2008.[17] On 31 October 2008, a link to a paper authored by Satoshi Nakamoto titled Bitcoin: A Peer-to-Peer Electronic Cash System[4] was posted to a cryptography mailing list.[18] Nakamoto implemented the bitcoin software as open-source code and released it in January 2009.[19][20][11] Nakamoto's identity remains unknown.[10]

تسمح تطبيقات بيتكوين والتي يُطلق عليها أحيانا اسم عميل بيتكوين للمُستخدمين بالتعامل مع شبكة بيتكوين. في شكله القاعدي يسمح التطبيق بتوليد وحفظ مفاتيح خاصة بالمُستخدم والاتصال بشبكة الند للند الخاص بالعُملة. تم إطلاق أول تطبيق بيتكوين سنة 2009 من طرف ساتوشي ناكاموتو مُؤسس عُملة بيتكوين كتطبيق مجاني ومفتوح المصدر. يُستخدم هذا التطبيق -والذي يُطلق عليه عادة اسم تطبيق ساتوشي- كمحفظة على الحواسيب الشخصية للقيام بعمليات دفع إلكترونية أو كخادوم لاستقبال تلك المدفوعات ولخدمات أخرى مُتعلقة بالدفع. أما تطبيق Bitcoin-Qt فيتم اعتباره كتطبيق مرجعي بحكم أنه يُمثل الآلية التي يعمل من خلالها بروتوكول بيتكوين ويُعتبر مثالا يُحتذى به لغيره من التطبيقات. لدى القيام بعمليات شراء باستخدام الهواتف الذكية فإنه عادة ما يتم استخدام تطبيقات بيتكوين تقوم بتوليد و/أو قراءة QR codes لتسهيل مهمة التحويل والدفع. كما تتوفر حاليا عدة تطبيقات تعمل كخواديم تقوم بتأكيد الإجراءات التي تتم على الشبكة وتقوم بإضافتها كتلة تحويلات.


In Ethereum all smart contracts are stored publicly on every node of the blockchain, which has costs.[57] Being a blockchain means it is secure by design and is an example of a distributed computing system with high Byzantine fault tolerance. The downside is that performance issues arise in that every node is calculating all the smart contracts in real time, resulting in lower speeds.[57] As of January 2016, the Ethereum protocol could process about 25 transactions per second.[57] In comparison, the Visa payment platform processes 45,000 payments per second leading some to question the scalability of Ethereum.[58] On 19 December 2016, Ethereum exceeded one million transactions in a single day for the first time.[59]

The "Metropolis Part 1: Byzantium" soft[citation needed] fork took effect on 16 October 2017, and included changes to reduce the complexity of the EVM and provide more flexibility for smart contract developers. Byzantium also added supports for zk-SNARKs (from Zcash), with the first zk-SNARK transaction occurring on testnet on September 19, 2017.[citation needed]
تسمح تطبيقات بيتكوين والتي يُطلق عليها أحيانا اسم عميل بيتكوين للمُستخدمين بالتعامل مع شبكة بيتكوين. في شكله القاعدي يسمح التطبيق بتوليد وحفظ مفاتيح خاصة بالمُستخدم والاتصال بشبكة الند للند الخاص بالعُملة. تم إطلاق أول تطبيق بيتكوين سنة 2009 من طرف ساتوشي ناكاموتو مُؤسس عُملة بيتكوين كتطبيق مجاني ومفتوح المصدر. يُستخدم هذا التطبيق -والذي يُطلق عليه عادة اسم تطبيق ساتوشي- كمحفظة على الحواسيب الشخصية للقيام بعمليات دفع إلكترونية أو كخادوم لاستقبال تلك المدفوعات ولخدمات أخرى مُتعلقة بالدفع. أما تطبيق Bitcoin-Qt فيتم اعتباره كتطبيق مرجعي بحكم أنه يُمثل الآلية التي يعمل من خلالها بروتوكول بيتكوين ويُعتبر مثالا يُحتذى به لغيره من التطبيقات. لدى القيام بعمليات شراء باستخدام الهواتف الذكية فإنه عادة ما يتم استخدام تطبيقات بيتكوين تقوم بتوليد و/أو قراءة QR codes لتسهيل مهمة التحويل والدفع. كما تتوفر حاليا عدة تطبيقات تعمل كخواديم تقوم بتأكيد الإجراءات التي تتم على الشبكة وتقوم بإضافتها كتلة تحويلات.
David Golumbia says that the ideas influencing bitcoin advocates emerge from right-wing extremist movements such as the Liberty Lobby and the John Birch Society and their anti-Central Bank rhetoric, or, more recently, Ron Paul and Tea Party-style libertarianism.[132] Steve Bannon, who owns a "good stake" in bitcoin, considers it to be "disruptive populism. It takes control back from central authorities. It's revolutionary."[133]
Researchers have pointed out at a "trend towards centralization". Although bitcoin can be sent directly from user to user, in practice intermediaries are widely used.[32]:220–222 Bitcoin miners join large mining pools to minimize the variance of their income.[32]:215, 219–222[115]:3[116] Because transactions on the network are confirmed by miners, decentralization of the network requires that no single miner or mining pool obtains 51% of the hashing power, which would allow them to double-spend coins, prevent certain transactions from being verified and prevent other miners from earning income.[117] As of 2013 just six mining pools controlled 75% of overall bitcoin hashing power.[117] In 2014 mining pool Ghash.io obtained 51% hashing power which raised significant controversies about the safety of the network. The pool has voluntarily capped their hashing power at 39.99% and requested other pools to act responsibly for the benefit of the whole network.[118] Between 2017 and 2019 over 70% of the hashing power and 90% of transactions were operating from China.[119]
To be accepted by the rest of the network, a new block must contain a proof-of-work (PoW).[75] The system used is based on Adam Back's 1997 anti-spam scheme, Hashcash.[85][4] The PoW requires miners to find a number called a nonce, such that when the block content is hashed along with the nonce, the result is numerically smaller than the network's difficulty target.[7]:ch. 8 This proof is easy for any node in the network to verify, but extremely time-consuming to generate, as for a secure cryptographic hash, miners must try many different nonce values (usually the sequence of tested values is the ascending natural numbers: 0, 1, 2, 3, ...[7]:ch. 8) before meeting the difficulty target.
According to the Library of Congress, an "absolute ban" on trading or using cryptocurrencies applies in eight countries: Algeria, Bolivia, Egypt, Iraq, Morocco, Nepal, Pakistan, and the United Arab Emirates. An "implicit ban" applies in another 15 countries, which include Bahrain, Bangladesh, China, Colombia, the Dominican Republic, Indonesia, Iran, Kuwait, Lesotho, Lithuania, Macau, Oman, Qatar, Saudi Arabia and Taiwan.[169]

تتمتع عملة البيتكوين بقدر عالٍ من السرية. مبدئيا الأمر صحيح، حيث أن كل ما تحتاجه لإرسال بعض البيتكوينات لشخص آخر هو عنوانه فقط. لكن بحكم أنه يتم تسجيل كل عملية تحويل في سجل بيتكوين فإنه بالرغم من عدم معرفتك لهوية مالك أي عُنوان إلا أنه بمقدورك أن تعرف كم عدد البيتكوينات التي في حوزته وما هي العناوين التي أرسلت بيتكوينات إليه. إن قام أحدهم بالإعلان صراحة عن امتلاكه لعناوين بيتكوين مُعينة فإنه سيُصبح بإمكانك معرفة ما هي العناوين التي قامت بإرسال بيتكوينات إليه وما هي العناوين التي أرسل إليها بيتكوينات. الكشف عن عنوان البيتكوين الخاص بك ليس مُستبعدا، حيث أنك ستحتاج إلى إعطائه لغيرك في حال ما إذا احتجت أن يرسلوا لك بعض المال إليه. يُنصح باستخدام عناوين مُختلفة لعمليات تحويل مُختلفة للحفاظ على مُستوى مُعين من المجهولية، رغم ذلك هناك الكثيرون ممن لا يقومون بذلك. من الناحية التقنية يبقى تتبع مصدر بعض العمليات المشبوهة على شبكة بيتكوين مُمكنا، حيث يكفي تتبع عمليات التحويل إلى غاية وصولها إلى عنوان معروفة هوية صاحبه، وحينها يكفي القيام بعمليات تحقيق عكسية إلى غاية الوصول إلى صاحب الحساب المشبوه. صحيح بأن كم البيانات المُتعلقة بجميع عمليات التحويل ضخم، إلا أن قوة الحواسيب في تزايد مُستمر وإمكانية تتبع هذه العمليات واردة جدا، بل ويُمكن الجزم بأنه تتبع عمليات سرقة البيتكوينات أسهل بكثير من تتبع سرقة الأموال على هيئتها الورقية.

Network nodes can validate transactions, add them to their copy of the ledger, and then broadcast these ledger additions to other nodes. To achieve independent verification of the chain of ownership each network node stores its own copy of the blockchain.[76] About every 10 minutes, a new group of accepted transactions, called a block, is created, added to the blockchain, and quickly published to all nodes, without requiring central oversight. This allows bitcoin software to determine when a particular bitcoin was spent, which is needed to prevent double-spending. A conventional ledger records the transfers of actual bills or promissory notes that exist apart from it, but the blockchain is the only place that bitcoins can be said to exist in the form of unspent outputs of transactions.[7]:ch. 5

Leveraged trading in foreign currency or off-exchange products on margin carries significant risk and may not be suitable for all investors. We advise you to carefully consider whether trading is appropriate for you based on your personal circumstances. Forex trading involves risk. Losses can exceed deposits. We recommend that you seek independent advice and ensure you fully understand the risks involved before trading.
Ethereum was initially described in a white paper by Vitalik Buterin,[10] a programmer involved with Bitcoin Magazine, in late 2013 with a goal of building decentralized applications.[11][12] Buterin had argued that Bitcoin needed a scripting language for application development. Failing to gain agreement, he proposed development of a new platform with a more general scripting language.[4]:88

^ Jump up to: a b c d "Statement of Jennifer Shasky Calvery, Director Financial Crimes Enforcement Network United States Department of the Treasury Before the United States Senate Committee on Banking, Housing, and Urban Affairs Subcommittee on National Security and International Trade and Finance Subcommittee on Economic Policy" (PDF). fincen.gov. Financial Crimes Enforcement Network. 19 November 2013. Archived (PDF) from the original on 9 October 2016. Retrieved 1 June 2014.
Ethereum is also being used as a platform to launch other cryptocurrencies. Because of the ERC20 token standard defined by the Ethereum Foundation, other developers can issue their own versions of this token and raise funds with an initial coin offering (ICO). In this fundraising strategy, the issuers of the token set an amount they want to raise, offer it in a crowdsale, and receive Ether in exchange. Billions of dollars have been raised by ICOs on the Ethereum platform in the last two years, and one of the most valuable cryptocurrencies in the world, EOS, is an ERC20 token.
Here’s why. Ethereum is based on blockchain technology where all transactions are meant to be irreversible and unchangeable. By executing a hard fork and rewriting the rules by which the blockchain executes, Ethereum set a dangerous precedent that goes against the very essence of blockchain. If the blockchain is changed every time a large enough amount of money is involved, or enough people get negatively impacted, the blockchain will lose its main value proposition – secure, anonymous, tamper proof & unchangeable.

^ Jump up to: a b c d "Statement of Jennifer Shasky Calvery, Director Financial Crimes Enforcement Network United States Department of the Treasury Before the United States Senate Committee on Banking, Housing, and Urban Affairs Subcommittee on National Security and International Trade and Finance Subcommittee on Economic Policy" (PDF). fincen.gov. Financial Crimes Enforcement Network. 19 November 2013. Archived (PDF) from the original on 9 October 2016. Retrieved 1 June 2014.
تُعتبر بيتكوين عُملة معمّاة (بالإنجليزية: cryptocurrency) ويُقصد بذلك أنها تعتمد بشكل أساسي على مبادئ التشفير في جميع جوانبها، كما أنها تُعتبر أيضا العُملة الأولى من نوعها والأكثر شهرة وانتشارًا لكن رغم ذلك ليست العُملة التشفيرية الوحيدة الموجودة على شبكة الإنترنت حاليًا. حيث يتوفر ما يزيد عن 60 عُملة تشفيرية مُختلفة[6] منها 6 عُملات يُمكن وصفها بالرئيسية [7] وذلك اعتمادًا على عدد المُستخدمين وبنية كل شبكة، إضافة إلى الأماكن التي يُمكن استبدال وشراء هذه العُملات التشفيرية مُقابل عُملات أخرى. جميع العُملات التشفيرية الحالية مبنية على مبدأ عمل عُملة بيتكوين نفسها باستثناء عُملة Ripple [8]، وبما أن عُملة بيتكوين مفتوحة المصدر فإنه من المُمكن استنساخها وإدخال بعض التعديلات عليها ومن ثم إطلاق عُملة جديدة.
نيمكوين : مليون هو مجموع عملة ال نيمكوين وهذا يعني أن ال نيمكوين ستكون نادرة نسبيا، بالضبط نفس مستوى ندرة ال بيتكوين . هذا وتساعد ال نيمكوين على إنشاء الإنترنت الغير خاضعة للرقابة، وتنكر السيطرة الحكومية. وهي منصة متعددة الاستخدامات يمكن استخدامها لنظام أسماء النطاقات الغير مركزي والغير منظم، نوع من الإنترنت الخاصة بها. ويمكن أيضا أن تستخدم لإرسال الرسائل، والتصويت، ونظام تسجيل الدخول.
Both blockchains have the same features and are identical in every way up to a certain block where the hard-fork was implemented. This means that everything that happened on Ethereum up until the hard-fork is still valid on the Ethereum Classic Blockchain. From the block where the hard fork or change in code was executed onwards, the two blockchains act individually.
The Bank for International Settlements summarized several criticisms of bitcoin in Chapter V of their 2018 annual report. The criticisms include the lack of stability in bitcoin's price, the high energy consumption, high and variable transactions costs, the poor security and fraud at cryptocurrency exchanges, vulnerability to debasement (from forking), and the influence of miners.[189][190][191]
Augur is an open-source prediction & forecasting market platform that allows anyone to forecast events and get rewarded for predicting them correctly. Predictions on future real world events, like who will win the next US election, are carried out by trading virtual shares. If a person buys shares in a winning prediction, they receive monetary rewards.
بروتوكول اكتشاف الجيران (NDP) بروتوكول حل العناوين (ARP) بروتوكولات نفقيّة (بروتوكول الأنفاق في الطبقة الثانية) بروتوكول الربط بين نقطتين (PPP) بروتوكول الشجرة المُتفرعة (STP) الواجهة البينية للبيانات الموزعة بالألياف (FDDI) تبديل الأطر الإيثرنت (IEEE 802.3). الشبكات المحليّة اللاسلكيّة (IEEE 802.11) الشبكات الشخصية اللاسلكية (IEEE 802.15) البلوتوث (IEEE 802.15.1) الشبكات الشخصية اللاسلكية منخفضة المعدل (IEEE 802.15.4) مزيد ..
Transactions are defined using a Forth-like scripting language.[7]:ch. 5 Transactions consist of one or more inputs and one or more outputs. When a user sends bitcoins, the user designates each address and the amount of bitcoin being sent to that address in an output. To prevent double spending, each input must refer to a previous unspent output in the blockchain.[77] The use of multiple inputs corresponds to the use of multiple coins in a cash transaction. Since transactions can have multiple outputs, users can send bitcoins to multiple recipients in one transaction. As in a cash transaction, the sum of inputs (coins used to pay) can exceed the intended sum of payments. In such a case, an additional output is used, returning the change back to the payer.[77] Any input satoshis not accounted for in the transaction outputs become the transaction fee.[77]
Ethereum's blockchain uses Merkle trees, for security reasons, to improve scalability, and to optimize transaction hashing.[61] As with any Merkle tree implementation, it allows for storage savings, set membership proofs (called "Merkle proofs"), and light client synchronization. The Ethereum network has at times faced congestion problems, for example, congestion occurred during late 2017 in relation to Cryptokitties.[62]
Izabella Kaminska, the editor of FT Alphaville, has pointed out that criminals are using Ethereum to run Ponzi schemes and other forms of investment fraud.[67] The article was based on a paper from the University of Cagliari, which placed the number of Ethereum smart contracts which facilitate Ponzi schemes at nearly 10% of 1384 smart contracts examined. However, it also estimated that only 0.05% of the transactions on the network were related to such contracts.[68]
“A DAO consists of one or more contracts and could be funded by a group of like-minded individuals. A DAO operates completely transparently and completely independently of any human intervention, including its original creators. A DAO will stay on the network as long as it covers its survival costs and provides a useful service to its customer base” Stephen Tual, Slock.it Founder, former CCO Ethereum.
The price of bitcoins has gone through cycles of appreciation and depreciation referred to by some as bubbles and busts.[159] In 2011, the value of one bitcoin rapidly rose from about US$0.30 to US$32 before returning to US$2.[160] In the latter half of 2012 and during the 2012–13 Cypriot financial crisis, the bitcoin price began to rise,[161] reaching a high of US$266 on 10 April 2013, before crashing to around US$50. On 29 November 2013, the cost of one bitcoin rose to a peak of US$1,242.[162] In 2014, the price fell sharply, and as of April remained depressed at little more than half 2013 prices. As of August 2014 it was under US$600.[163] During their time as bitcoin developers, Gavin Andresen[164] and Mike Hearn[165] warned that bubbles may occur.
×