The successful miner finding the new block is allowed by the rest of the network to reward themselves with newly created bitcoins and transaction fees.[88] As of 9 July 2016,[89] the reward amounted to 12.5 newly created bitcoins per block added to the blockchain, plus any transaction fees from payments processed by the block. To claim the reward, a special transaction called a coinbase is included with the processed payments.[7]:ch. 8 All bitcoins in existence have been created in such coinbase transactions. The bitcoin protocol specifies that the reward for adding a block will be halved every 210,000 blocks (approximately every four years). Eventually, the reward will decrease to zero, and the limit of 21 million bitcoins[f] will be reached c. 2140; the record keeping will then be rewarded solely by transaction fees.[90]

Though transaction fees are optional, miners can choose which transactions to process and prioritize those that pay higher fees.[77] Miners may choose transactions based on the fee paid relative to their storage size, not the absolute amount of money paid as a fee. These fees are generally measured in satoshis per byte (sat/b). The size of transactions is dependent on the number of inputs used to create the transaction, and the number of outputs.[7]:ch. 8

An official investigation into bitcoin traders was reported in May 2018.[177] The U.S. Justice Department launched an investigation into possible price manipulation, including the techniques of spoofing and wash trades.[178][179][180] Traders in the U.S., the U.K, South Korea, and possibly other countries are being investigated.[177] Brett Redfearn, head of the U.S. Securities and Exchange Commission's Division of Trading and Markets, had identified several manipulation techniques of concern in March 2018.


Ethereum can also be used to build Decentralized Autonomous Organizations (DAO). A DAO is fully autonomous, decentralized organization with no single leader. DAO’s are run by programming code, on a collection of smart contracts written on the Ethereum blockchain. The code is designed to replace the rules and structure of a traditional organization, eliminating the need for people and centralized control. A DAO is owned by everyone who purchases tokens, but instead of each token equating to equity shares & ownership, tokens act as contributions that give people voting rights.

David Golumbia says that the ideas influencing bitcoin advocates emerge from right-wing extremist movements such as the Liberty Lobby and the John Birch Society and their anti-Central Bank rhetoric, or, more recently, Ron Paul and Tea Party-style libertarianism.[132] Steve Bannon, who owns a "good stake" in bitcoin, considers it to be "disruptive populism. It takes control back from central authorities. It's revolutionary."[133]
^ "Crib Sheet: Neptune's Brood – Charlie's Diary". www.antipope.org. Archived from the original on 14 June 2017. Retrieved 5 December 2017. I wrote Neptune's Brood in 2011. Bitcoin was obscure back then, and I figured had just enough name recognition to be a useful term for an interstellar currency: it'd clue people in that it was a networked digital currency.
البيتكوين عملة رقمية ذات مجهولية، حيث أن عملية التحويل عبرها يتطلب فقط معرفة رقم محفظة الشخص المحول إليه ويتم تخزين عملية التحويل في سلسلة الكتل برقم تسلسلي خاص ولا يتضمن هذا اسم المرسل او المتلقي او اي بيانات اخرى خاصة بهما، مما يجعل منها فكرة رائجة لدى كل من المدافعين عن الخصوصية، أو بائعي البضائع غير المشروعة (مثل المخدرات) عبر الإنترنت على حد سواء.[9]
Researchers have pointed out at a "trend towards centralization". Although bitcoin can be sent directly from user to user, in practice intermediaries are widely used.[32]:220–222 Bitcoin miners join large mining pools to minimize the variance of their income.[32]:215, 219–222[115]:3[116] Because transactions on the network are confirmed by miners, decentralization of the network requires that no single miner or mining pool obtains 51% of the hashing power, which would allow them to double-spend coins, prevent certain transactions from being verified and prevent other miners from earning income.[117] As of 2013 just six mining pools controlled 75% of overall bitcoin hashing power.[117] In 2014 mining pool Ghash.io obtained 51% hashing power which raised significant controversies about the safety of the network. The pool has voluntarily capped their hashing power at 39.99% and requested other pools to act responsibly for the benefit of the whole network.[118] Between 2017 and 2019 over 70% of the hashing power and 90% of transactions were operating from China.[119]

تُعتبر بيتكوين عُملة معمّاة (بالإنجليزية: cryptocurrency) ويُقصد بذلك أنها تعتمد بشكل أساسي على مبادئ التشفير في جميع جوانبها، كما أنها تُعتبر أيضا العُملة الأولى من نوعها والأكثر شهرة وانتشارًا لكن رغم ذلك ليست العُملة التشفيرية الوحيدة الموجودة على شبكة الإنترنت حاليًا. حيث يتوفر ما يزيد عن 60 عُملة تشفيرية مُختلفة[6] منها 6 عُملات يُمكن وصفها بالرئيسية [7] وذلك اعتمادًا على عدد المُستخدمين وبنية كل شبكة، إضافة إلى الأماكن التي يُمكن استبدال وشراء هذه العُملات التشفيرية مُقابل عُملات أخرى. جميع العُملات التشفيرية الحالية مبنية على مبدأ عمل عُملة بيتكوين نفسها باستثناء عُملة Ripple [8]، وبما أن عُملة بيتكوين مفتوحة المصدر فإنه من المُمكن استنساخها وإدخال بعض التعديلات عليها ومن ثم إطلاق عُملة جديدة.
To be accepted by the rest of the network, a new block must contain a proof-of-work (PoW).[75] The system used is based on Adam Back's 1997 anti-spam scheme, Hashcash.[85][4] The PoW requires miners to find a number called a nonce, such that when the block content is hashed along with the nonce, the result is numerically smaller than the network's difficulty target.[7]:ch. 8 This proof is easy for any node in the network to verify, but extremely time-consuming to generate, as for a secure cryptographic hash, miners must try many different nonce values (usually the sequence of tested values is the ascending natural numbers: 0, 1, 2, 3, ...[7]:ch. 8) before meeting the difficulty target.
تُعتبر بيتكوين عُملة معمّاة (بالإنجليزية: cryptocurrency) ويُقصد بذلك أنها تعتمد بشكل أساسي على مبادئ التشفير في جميع جوانبها، كما أنها تُعتبر أيضا العُملة الأولى من نوعها والأكثر شهرة وانتشارًا لكن رغم ذلك ليست العُملة التشفيرية الوحيدة الموجودة على شبكة الإنترنت حاليًا. حيث يتوفر ما يزيد عن 60 عُملة تشفيرية مُختلفة[6] منها 6 عُملات يُمكن وصفها بالرئيسية [7] وذلك اعتمادًا على عدد المُستخدمين وبنية كل شبكة، إضافة إلى الأماكن التي يُمكن استبدال وشراء هذه العُملات التشفيرية مُقابل عُملات أخرى. جميع العُملات التشفيرية الحالية مبنية على مبدأ عمل عُملة بيتكوين نفسها باستثناء عُملة Ripple [8]، وبما أن عُملة بيتكوين مفتوحة المصدر فإنه من المُمكن استنساخها وإدخال بعض التعديلات عليها ومن ثم إطلاق عُملة جديدة.
This website is intended to provide a clear summary of Ethereum's current and historical price as well as important updates from the industry. I've also included a number of ERC20 tokens which can be found in the tokens tab at the top right. Prices are updated every minute in real-time and the open/close prices are recorded at midnight UTC. Bookmark us!

There is ongoing research on how to use formal verification to express and prove non-trivial properties. A Microsoft Research report noted that writing solid smart contracts can be extremely difficult in practice, using The DAO hack to illustrate this problem. The report discussed tools that Microsoft had developed for verifying contracts, and noted that a large-scale analysis of published contracts is likely to uncover widespread vulnerabilities. The report also stated that it is possible to verify the equivalence of a Solidity program and the EVM code.[41]
Vitalik Buterin picked the name Ethereum after browsing Wikipedia articles about elements and science fiction, when he found the name, noting, "I immediately realized that I liked it better than all of the other alternatives that I had seen; I suppose it was the fact that sounded nice and it had the word 'ether', referring to the hypothetical invisible medium that permeates the universe and allows light to travel."[9]
Here’s why. Ethereum is based on blockchain technology where all transactions are meant to be irreversible and unchangeable. By executing a hard fork and rewriting the rules by which the blockchain executes, Ethereum set a dangerous precedent that goes against the very essence of blockchain. If the blockchain is changed every time a large enough amount of money is involved, or enough people get negatively impacted, the blockchain will lose its main value proposition – secure, anonymous, tamper proof & unchangeable.
^ Mooney, Chris; Mufson, Steven (19 December 2017). "Why the bitcoin craze is using up so much energy". The Washington Post. Archived from the original on 9 January 2018. Retrieved 11 January 2018. several experts told The Washington Post that bitcoin probably uses as much as 1 to 4 gigawatts, or billion watts, of electricity, roughly the output of one to three nuclear reactors. 

نيمكوين : مليون هو مجموع عملة ال نيمكوين وهذا يعني أن ال نيمكوين ستكون نادرة نسبيا، بالضبط نفس مستوى ندرة ال بيتكوين . هذا وتساعد ال نيمكوين على إنشاء الإنترنت الغير خاضعة للرقابة، وتنكر السيطرة الحكومية. وهي منصة متعددة الاستخدامات يمكن استخدامها لنظام أسماء النطاقات الغير مركزي والغير منظم، نوع من الإنترنت الخاصة بها. ويمكن أيضا أن تستخدم لإرسال الرسائل، والتصويت، ونظام تسجيل الدخول.


Third-party internet services called online wallets offer similar functionality but may be easier to use. In this case, credentials to access funds are stored with the online wallet provider rather than on the user's hardware.[97] As a result, the user must have complete trust in the online wallet provider. A malicious provider or a breach in server security may cause entrusted bitcoins to be stolen. An example of such a security breach occurred with Mt. Gox in 2011.[98]
The proof-of-work system, alongside the chaining of blocks, makes modifications of the blockchain extremely hard, as an attacker must modify all subsequent blocks in order for the modifications of one block to be accepted.[87] As new blocks are mined all the time, the difficulty of modifying a block increases as time passes and the number of subsequent blocks (also called confirmations of the given block) increases.[75]

• لا حرج من دفع عمولات تحويل العملات: كما هو شائع بالنسبة للبعض أن دفع العُمولات عبر شبكات الإنترنت مقابل خدمات تحويل أو شراء عُملات البيتكوين يُعد شكل من أشكال الربا غير المسموح بها. لكن إستناداُ إلى ما تم ذكره بحسب الفتوى رقم 259576 أن لا هناك أى حرج على دفع مثل هذه العمولات. حيث إنك تدفع مُقابل حصولك على خدمة معينة بما فيها خدمات تحويل وشراء عُملات البيتكوين الإفتراضية.
بروتوكول اكتشاف الجيران (NDP) بروتوكول حل العناوين (ARP) بروتوكولات نفقيّة (بروتوكول الأنفاق في الطبقة الثانية) بروتوكول الربط بين نقطتين (PPP) بروتوكول الشجرة المُتفرعة (STP) الواجهة البينية للبيانات الموزعة بالألياف (FDDI) تبديل الأطر الإيثرنت (IEEE 802.3). الشبكات المحليّة اللاسلكيّة (IEEE 802.11) الشبكات الشخصية اللاسلكية (IEEE 802.15) البلوتوث (IEEE 802.15.1) الشبكات الشخصية اللاسلكية منخفضة المعدل (IEEE 802.15.4) مزيد ..
Bitcoin (BTC) is known as the first open-source, peer-to-peer, digital cryptocurrency that was developed and released by a group of unknown independent programmers named Satoshi Nakamoto in 2008. Cryptocoin doesn’t have any centralized server used for its issuing, transactions and storing, as it uses a distributed network public database technology named blockchain, which requires an electronic signature and is supported by a proof-of-work protocol to provide the security and legitimacy of money transactions. The issuing of Bitcoin is done by users with mining capabilities and is limited to 21 million coins. Currently, Bitcoin’s market cap surpasses $138 billion and this is the most popular kind of digital currency. Buying and selling cryptocurrency is available through special Bitcoin exchange platforms or ATMs.
لضمان صحّة عمليات التحويل، يقوم نظام البيتكوين بالاحتفاظ بسجل حسابات تُسجل فيه جميع الإجراءات التي تتم على الشبكة يُطلق عليه اسم سلسلة الكُتل (بالإنجليزية: block chain). تتشارك جميع العُقد المتواجدة على شبكة البيتكوين هذا السجل عبر نظام يعتمد على بروتوكول بِتكُيِن. تحتوي سلسلة الكُتل على جميع الإجراءات التي تمت باستخدام بِتكُيِن، وهو ما يُمكن من معرفة الرصيد الذي يملكه كل عنوان على هذه الشبكة. يُطلق على هذا المفهوم وصف السلسلة للترابط المتواجد ما بين الكُتل، حيث تحتوي كل كُتلة على هاش الكُتلة التي تسبقها ويتواصل الأمر إلى غاية الوصول إلى الكُتلة الأولى التي يُطلق عليها اسم "كتلة التكوين" (بالإنجليزية: genesis block) . تكوين السلسلة بهذه الطريقة يجعل من مهمة تغيير أي كُتلة بعد مرور مُدة مُعينة على إنشائها في غاية الصعوبة، حيث أن تغيير أي كُتلة يتطلب تغيير كل الكُتل التي تليها بسبب الحاجة إلى إعادة حساب هاش كل كُتلة لتحديث قيمة هاش الكُتلة السابقة فيها. هذه الخاصية هي ما يجعل من مُشكل الإنفاق المُتكرر لنفس العُملات في غاية الصعوبة على بِتكُيِن، بل ويُمكن اعتبار سلسلة الكُتل العمود الفقري الذي لا يُمكن لعُملة بِتكُيِن الوقوف من دونه[10].

There is ongoing research on how to use formal verification to express and prove non-trivial properties. A Microsoft Research report noted that writing solid smart contracts can be extremely difficult in practice, using The DAO hack to illustrate this problem. The report discussed tools that Microsoft had developed for verifying contracts, and noted that a large-scale analysis of published contracts is likely to uncover widespread vulnerabilities. The report also stated that it is possible to verify the equivalence of a Solidity program and the EVM code.[41]


Ethereum’s core innovation, the Ethereum Virtual Machine (EVM) is a Turing complete software that runs on the Ethereum network. It enables anyone to run any program, regardless of the programming language given enough time and memory. The Ethereum Virtual Machine makes the process of creating blockchain applications much easier and efficient than ever before. Instead of having to build an entirely original blockchain for each new application, Ethereum enables the development of potentially thousands of different applications all on one platform.
The first wallet program, simply named Bitcoin, and sometimes referred to as the Satoshi client, was released in 2009 by Satoshi Nakamoto as open-source software.[11] In version 0.5 the client moved from the wxWidgets user interface toolkit to Qt, and the whole bundle was referred to as Bitcoin-Qt.[107] After the release of version 0.9, the software bundle was renamed Bitcoin Core to distinguish itself from the underlying network.[108][109]
Ethereum is the pioneer for blockchain based smart contracts. When running on the blockchain a smart contract becomes like a self-operating computer program that automatically executes when specific conditions are met. On the blockchain, smart contracts allow for code to be run exactly as programmed without any possibility of downtime, censorship, fraud or third-party interference. It can facilitate the exchange of money, content, property, shares, or anything of value. The Ethereum network went live on July 30th, 2015 with 72 million Ethereum premined.
Ethereum is also being used as a platform to launch other cryptocurrencies. Because of the ERC20 token standard defined by the Ethereum Foundation, other developers can issue their own versions of this token and raise funds with an initial coin offering (ICO). In this fundraising strategy, the issuers of the token set an amount they want to raise, offer it in a crowdsale, and receive Ether in exchange. Billions of dollars have been raised by ICOs on the Ethereum platform in the last two years, and one of the most valuable cryptocurrencies in the world, EOS, is an ERC20 token.
Ethereum was initially described in a white paper by Vitalik Buterin,[10] a programmer involved with Bitcoin Magazine, in late 2013 with a goal of building decentralized applications.[11][12] Buterin had argued that Bitcoin needed a scripting language for application development. Failing to gain agreement, he proposed development of a new platform with a more general scripting language.[4]:88
Using Ethereum’s “Turing complete” smart contract language, Solidity, developers are able to deploy a set of instructions to the blockchain that operate indefinitely with a high degree of finality and fraud-resistance. With the first block being mined in July 2015, Ethereum has since become the largest smart contract platform of its kind, and the second largest blockchain of all time as measured by market capitalization.

Third-party internet services called online wallets offer similar functionality but may be easier to use. In this case, credentials to access funds are stored with the online wallet provider rather than on the user's hardware.[97] As a result, the user must have complete trust in the online wallet provider. A malicious provider or a breach in server security may cause entrusted bitcoins to be stolen. An example of such a security breach occurred with Mt. Gox in 2011.[98]
Because of bitcoin's decentralized nature and its trading on online exchanges located in many countries, regulation of bitcoin has been difficult. However, the use of bitcoin can be criminalized, and shutting down exchanges and the peer-to-peer economy in a given country would constitute a de facto ban.[167] The legal status of bitcoin varies substantially from country to country and is still undefined or changing in many of them. Regulations and bans that apply to bitcoin probably extend to similar cryptocurrency systems.[168]
Physical wallets store the credentials necessary to spend bitcoins offline and can be as simple as a paper printout of the private key;[7]:ch. 10 a paper wallet. A paper wallet is created with a keypair generated on a computer with no internet connection; the private key is written or printed onto the paper[g] and then erased from the computer. The paper wallet can then be stored in a safe physical location for later retrieval. Bitcoins stored using a paper wallet are said to be in cold storage.[99]:39 In a 2014 interview, QuadrigaCX founder Gerald Cotten explained that the company stored customer funds on paper wallets in safe deposit boxes: "So we just send money to them, we don’t need to go back to the bank every time we want to put money into it. We just send money from our Bitcoin app directly to those paper wallets, and keep it safe that way."[100]
×