^ Jump up to: a b c d "Statement of Jennifer Shasky Calvery, Director Financial Crimes Enforcement Network United States Department of the Treasury Before the United States Senate Committee on Banking, Housing, and Urban Affairs Subcommittee on National Security and International Trade and Finance Subcommittee on Economic Policy" (PDF). fincen.gov. Financial Crimes Enforcement Network. 19 November 2013. Archived (PDF) from the original on 9 October 2016. Retrieved 1 June 2014.
There are many ways you can plug into the Ethereum network, one of the easiest ways is to use its native Mist browser. Mist provides a user-friendly interface & digital wallet for users to trade & store Ether as well as write, manage, deploy and use smart contracts. Like web browsers give access and help people navigate the internet, Mist provides a portal into the world of decentralized blockchain applications.

The Ethereum Virtual Machine (EVM) is the runtime environment for smart contracts in Ethereum. It is a 256-bit register stack, designed to run the same code exactly as intended. It is the fundamental consensus mechanism for Ethereum. The formal definition of the EVM is specified in the Ethereum Yellow Paper.[34][37] On February 1, 2018, there were 27,500 nodes in the main Ethereum network.[38] Ethereum Virtual Machines have been implemented in C++, Go, Haskell, Java, JavaScript, Python, Ruby, Rust, Elixir, Erlang, and soon, WebAssembly (currently under development).


While it’s still early days, Mist, MetaMask and a variety of other browsers look set to make blockchain-based applications accessible to more people than ever before. Even people without a technical background can now potentially build blockchain apps. This is a revolutionary leap for blockchain technology that could bring decentralized applications into the mainstream.

Ethereum was announced at the North American Bitcoin Conference in Miami, in January, 2014.[9] During the same time as the conference, a group of people rented a house in Miami Gavin Wood, Charles Hoskinson, and Anthony Di Iorio, a Torontonian who financed the project.[9] Di Iorio invited friend Joseph Lubin, who invited reporter Morgen Peck, to bear witness.[9] Six months later the founders met again in a house in Zug Switzerland, where Buterin told the founders that the project would proceed as a non-profit. Hoskinson left the project at that time.[9]
Until relatively recently, building blockchain applications has required a complex background in coding, cryptography, mathematics as well as significant resources. But times have changed. Previously unimagined applications, from electronic voting & digitally recorded property assets to regulatory compliance & trading are now actively being developed and deployed faster than ever before. By providing developers with the tools to build decentralized applications, Ethereum is making all of this possible.

Bitcoin has been criticized for the amount of electricity consumed by mining. As of 2015, The Economist estimated that even if all miners used modern facilities, the combined electricity consumption would be 166.7 megawatts (1.46 terawatt-hours per year).[136] At the end of 2017, the global bitcoin mining activity was estimated to consume between one and four gigawatts of electricity.[203] Politico noted that the even high-end estimates of bitcoin's total consumption levels amount to only about 6% of the total power consumed by the global banking sector, and even if bitcoin's consumption levels increased 100 fold from today's levels, bitcoin's consumption would still only amount to about 2% of global power consumption.[204]
Full clients verify transactions directly by downloading a full copy of the blockchain (over 150 GB As of January 2018).[95] They are the most secure and reliable way of using the network, as trust in external parties is not required. Full clients check the validity of mined blocks, preventing them from transacting on a chain that breaks or alters network rules.[7]:ch. 1 Because of its size and complexity, downloading and verifying the entire blockchain is not suitable for all computing devices.

بروتوكول اكتشاف الجيران (NDP) بروتوكول حل العناوين (ARP) بروتوكولات نفقيّة (بروتوكول الأنفاق في الطبقة الثانية) بروتوكول الربط بين نقطتين (PPP) بروتوكول الشجرة المُتفرعة (STP) الواجهة البينية للبيانات الموزعة بالألياف (FDDI) تبديل الأطر الإيثرنت (IEEE 802.3). الشبكات المحليّة اللاسلكيّة (IEEE 802.11) الشبكات الشخصية اللاسلكية (IEEE 802.15) البلوتوث (IEEE 802.15.1) الشبكات الشخصية اللاسلكية منخفضة المعدل (IEEE 802.15.4) مزيد ..
As with other cryptocurrencies, the validity of each ether is provided by a blockchain, which is a continuously growing list of records, called blocks, which are linked and secured using cryptography.[30][31] By design, the blockchain is inherently resistant to modification of the data. It is an open, distributed ledger that records transactions between two parties efficiently and in a verifiable and permanent way.[32] Unlike Bitcoin, Ethereum operates using accounts and balances in a manner called state transitions. This does not rely upon unspent transaction outputs (UTXOs). State denotes the current balances of all accounts and extra data. State is not stored on the blockchain, it is stored in a separate Merkle Patricia tree. A cryptocurrency wallet stores the public and private "keys" or "addresses" which can be used to receive or spend ether. These can be generated through BIP 39 style mnemonics for a BIP 32 "HD Wallet". In Ethereum, this is unnecessary as it does not operate in a UTXO scheme. With the private key, it is possible to write in the blockchain, effectively making an ether transaction.
The successful miner finding the new block is allowed by the rest of the network to reward themselves with newly created bitcoins and transaction fees.[88] As of 9 July 2016,[89] the reward amounted to 12.5 newly created bitcoins per block added to the blockchain, plus any transaction fees from payments processed by the block. To claim the reward, a special transaction called a coinbase is included with the processed payments.[7]:ch. 8 All bitcoins in existence have been created in such coinbase transactions. The bitcoin protocol specifies that the reward for adding a block will be halved every 210,000 blocks (approximately every four years). Eventually, the reward will decrease to zero, and the limit of 21 million bitcoins[f] will be reached c. 2140; the record keeping will then be rewarded solely by transaction fees.[90]
Ethereum has recently created a new standard called the ERC721 token for tracking unique digital assets. One of the biggest use cases currently for such tokens is digital collectibles, as the infrastructure allows for people to prove ownership of scarce digital goods. Many games are currently being built using this technology, such as the overnight hit CryptoKitties, a game where you can collect and breed digital cats.
Bitcoin has been criticized for the amount of electricity consumed by mining. As of 2015, The Economist estimated that even if all miners used modern facilities, the combined electricity consumption would be 166.7 megawatts (1.46 terawatt-hours per year).[136] At the end of 2017, the global bitcoin mining activity was estimated to consume between one and four gigawatts of electricity.[203] Politico noted that the even high-end estimates of bitcoin's total consumption levels amount to only about 6% of the total power consumed by the global banking sector, and even if bitcoin's consumption levels increased 100 fold from today's levels, bitcoin's consumption would still only amount to about 2% of global power consumption.[204]
Izabella Kaminska, the editor of FT Alphaville, has pointed out that criminals are using Ethereum to run Ponzi schemes and other forms of investment fraud.[67] The article was based on a paper from the University of Cagliari, which placed the number of Ethereum smart contracts which facilitate Ponzi schemes at nearly 10% of 1384 smart contracts examined. However, it also estimated that only 0.05% of the transactions on the network were related to such contracts.[68]

Network nodes can validate transactions, add them to their copy of the ledger, and then broadcast these ledger additions to other nodes. To achieve independent verification of the chain of ownership each network node stores its own copy of the blockchain.[76] About every 10 minutes, a new group of accepted transactions, called a block, is created, added to the blockchain, and quickly published to all nodes, without requiring central oversight. This allows bitcoin software to determine when a particular bitcoin was spent, which is needed to prevent double-spending. A conventional ledger records the transfers of actual bills or promissory notes that exist apart from it, but the blockchain is the only place that bitcoins can be said to exist in the form of unspent outputs of transactions.[7]:ch. 5


تسمح تطبيقات بيتكوين والتي يُطلق عليها أحيانا اسم عميل بيتكوين للمُستخدمين بالتعامل مع شبكة بيتكوين. في شكله القاعدي يسمح التطبيق بتوليد وحفظ مفاتيح خاصة بالمُستخدم والاتصال بشبكة الند للند الخاص بالعُملة. تم إطلاق أول تطبيق بيتكوين سنة 2009 من طرف ساتوشي ناكاموتو مُؤسس عُملة بيتكوين كتطبيق مجاني ومفتوح المصدر. يُستخدم هذا التطبيق -والذي يُطلق عليه عادة اسم تطبيق ساتوشي- كمحفظة على الحواسيب الشخصية للقيام بعمليات دفع إلكترونية أو كخادوم لاستقبال تلك المدفوعات ولخدمات أخرى مُتعلقة بالدفع. أما تطبيق Bitcoin-Qt فيتم اعتباره كتطبيق مرجعي بحكم أنه يُمثل الآلية التي يعمل من خلالها بروتوكول بيتكوين ويُعتبر مثالا يُحتذى به لغيره من التطبيقات. لدى القيام بعمليات شراء باستخدام الهواتف الذكية فإنه عادة ما يتم استخدام تطبيقات بيتكوين تقوم بتوليد و/أو قراءة QR codes لتسهيل مهمة التحويل والدفع. كما تتوفر حاليا عدة تطبيقات تعمل كخواديم تقوم بتأكيد الإجراءات التي تتم على الشبكة وتقوم بإضافتها كتلة تحويلات.
Third-party internet services called online wallets offer similar functionality but may be easier to use. In this case, credentials to access funds are stored with the online wallet provider rather than on the user's hardware.[97] As a result, the user must have complete trust in the online wallet provider. A malicious provider or a breach in server security may cause entrusted bitcoins to be stolen. An example of such a security breach occurred with Mt. Gox in 2011.[98]
Because of bitcoin's decentralized nature and its trading on online exchanges located in many countries, regulation of bitcoin has been difficult. However, the use of bitcoin can be criminalized, and shutting down exchanges and the peer-to-peer economy in a given country would constitute a de facto ban.[167] The legal status of bitcoin varies substantially from country to country and is still undefined or changing in many of them. Regulations and bans that apply to bitcoin probably extend to similar cryptocurrency systems.[168]
The Ethereum Virtual Machine (EVM) is the runtime environment for smart contracts in Ethereum. It is a 256-bit register stack, designed to run the same code exactly as intended. It is the fundamental consensus mechanism for Ethereum. The formal definition of the EVM is specified in the Ethereum Yellow Paper.[34][37] On February 1, 2018, there were 27,500 nodes in the main Ethereum network.[38] Ethereum Virtual Machines have been implemented in C++, Go, Haskell, Java, JavaScript, Python, Ruby, Rust, Elixir, Erlang, and soon, WebAssembly (currently under development).

Full clients verify transactions directly by downloading a full copy of the blockchain (over 150 GB As of January 2018).[95] They are the most secure and reliable way of using the network, as trust in external parties is not required. Full clients check the validity of mined blocks, preventing them from transacting on a chain that breaks or alters network rules.[7]:ch. 1 Because of its size and complexity, downloading and verifying the entire blockchain is not suitable for all computing devices.
^ Jump up to: a b c d "Statement of Jennifer Shasky Calvery, Director Financial Crimes Enforcement Network United States Department of the Treasury Before the United States Senate Committee on Banking, Housing, and Urban Affairs Subcommittee on National Security and International Trade and Finance Subcommittee on Economic Policy" (PDF). fincen.gov. Financial Crimes Enforcement Network. 19 November 2013. Archived (PDF) from the original on 9 October 2016. Retrieved 1 June 2014.
الجدير بالذكر بأن بعض المواقع كانت تنشر سابقا تقديرا لمقدار الخسارة/ الربح الذي يُسجله المنقبون لكن يبدو بأنهم توقفوا عن القيام بذلك لأسباب نجهلها. قد يعتقد البعض بأنه لم يكن بالإمكان إعطاء تقدير دقيق لمقدار الخسارة أو الربح الذي يُسجله المنقبون، ولذلك تم التخلص من ذلك. إلا أنه من المُمكن جدا أنه تم التخلص من ذلك لكيلا يتم تنفير المُنقبين من عمليات التنقيب.
There are many ways you can plug into the Ethereum network, one of the easiest ways is to use its native Mist browser. Mist provides a user-friendly interface & digital wallet for users to trade & store Ether as well as write, manage, deploy and use smart contracts. Like web browsers give access and help people navigate the internet, Mist provides a portal into the world of decentralized blockchain applications.

While another less aggressive soft fork solution was put forth, the Ethereum community and its founders were placed in a perilous position. If they didn’t retrieve the stolen investor money, confidence in Ethereum could be lost. On the other hand, recovering investor money required actions that went against the core ideas of decentralization and set a dangerous precedent.
David Golumbia says that the ideas influencing bitcoin advocates emerge from right-wing extremist movements such as the Liberty Lobby and the John Birch Society and their anti-Central Bank rhetoric, or, more recently, Ron Paul and Tea Party-style libertarianism.[132] Steve Bannon, who owns a "good stake" in bitcoin, considers it to be "disruptive populism. It takes control back from central authorities. It's revolutionary."[133]
Vitalik Buterin picked the name Ethereum after browsing Wikipedia articles about elements and science fiction, when he found the name, noting, "I immediately realized that I liked it better than all of the other alternatives that I had seen; I suppose it was the fact that sounded nice and it had the word 'ether', referring to the hypothetical invisible medium that permeates the universe and allows light to travel."[9]
Ether is a token whose blockchain is generated by the Ethereum platform. Ether can be transferred between accounts and used to compensate participant mining nodes for computations performed.[3] Ethereum provides a decentralized virtual machine, the Ethereum Virtual Machine (EVM), which can execute scripts using an international network of public nodes.[4] The virtual machine's instruction set, in contrast to others like Bitcoin Script, is thought to be Turing-complete. "Gas", an internal transaction pricing mechanism, is used to mitigate spam and allocate resources on the network.[4]

Transactions are defined using a Forth-like scripting language.[7]:ch. 5 Transactions consist of one or more inputs and one or more outputs. When a user sends bitcoins, the user designates each address and the amount of bitcoin being sent to that address in an output. To prevent double spending, each input must refer to a previous unspent output in the blockchain.[77] The use of multiple inputs corresponds to the use of multiple coins in a cash transaction. Since transactions can have multiple outputs, users can send bitcoins to multiple recipients in one transaction. As in a cash transaction, the sum of inputs (coins used to pay) can exceed the intended sum of payments. In such a case, an additional output is used, returning the change back to the payer.[77] Any input satoshis not accounted for in the transaction outputs become the transaction fee.[77]


A wallet stores the information necessary to transact bitcoins. While wallets are often described as a place to hold[93] or store bitcoins, due to the nature of the system, bitcoins are inseparable from the blockchain transaction ledger. A wallet is more correctly defined as something that "stores the digital credentials for your bitcoin holdings" and allows one to access (and spend) them.[7]:ch. 1, glossary Bitcoin uses public-key cryptography, in which two cryptographic keys, one public and one private, are generated.[94] At its most basic, a wallet is a collection of these keys.
The rapid price increase of Ethereum has not only attracted investors but developers too. Ethereum has tens of thousands of developers in its open source community, each contributing to the many layers of the “Ethereum stack”. This includes code contributions to the core Ethereum clients, second layer scaling tech and the “decentralized applications” (dApps) that are built on top of the platform. The appeal of Ethereum to developers is unique in that it was the first platform to allow anyone in the world to write and deploy code that would run without the risk of censorship. The community of developers which have formed around these core principles have led to the creation of technologies that could not have existed without the inception of Ethereum, many of which were never predicted. Some of the major use-cases of Ethereum so far have been:
• وسائل الحصول على عُملات البيتكوين: بُناء عى حكم الفتوى رقم: 231460 لدار الإفتاء، أكدت إنه إذا كان الحصول على هذه العُملات الإفتراضية مثل عمليات التعدين والتنقيب يتم بشكل سليم بعيد عن التلاعب والغش والسرقة والنصب، فيجوز إدراجها تحت بنود العُملات المُحللة. ولكن بشرط التقابض وهو ما يحدث مع تداول عُملات البيتكوين، كما أن الإستثمارات الناتجة من أرباح عمليات بيع وشراء البيتكوين من ضمن الأسباب التى تثبت تحليل عملات البيتكوين، حيث إنه إذا كُنت شخص سليم النية ستقوم بإستثمار أرباحك بما يُرضى الله ولأن الله أعلم بالنوايا ستُحتسب في ميزان حسناتك.
In Charles Stross' 2013 science fiction novel, Neptune's Brood, the universal interstellar payment system is known as "bitcoin" and operates using cryptography.[227] Stross later blogged that the reference was intentional, saying "I wrote Neptune's Brood in 2011. Bitcoin was obscure back then, and I figured had just enough name recognition to be a useful term for an interstellar currency: it'd clue people in that it was a networked digital currency."[228] 

Physical wallets can also take the form of metal token coins[102] with a private key accessible under a security hologram in a recess struck on the reverse side.[103]:38 The security hologram self-destructs when removed from the token, showing that the private key has been accessed.[104] Originally, these tokens were struck in brass and other base metals, but later used precious metals as bitcoin grew in value and popularity.[103]:80 Coins with stored face value as high as ₿1000 have been struck in gold.[103]:102–104 The British Museum's coin collection includes four specimens from the earliest series[103]:83 of funded bitcoin tokens; one is currently on display in the museum's money gallery.[105] In 2013, a Utahn manufacturer of these tokens was ordered by the Financial Crimes Enforcement Network (FinCEN) to register as a money services business before producing any more funded bitcoin tokens.[102][103]:80
Despite the fallout from The DAO hack, Ethereum is moving forward and looking to a bright future. By providing a user-friendly platform that enables people to harness the power of blockchain technology, Ethereum is speeding up the decentralization of the world economy. Decentralized applications have the potential to profoundly disrupt hundreds of industries including finance, real estate, academia, insurance, healthcare and the public sector amongst many others.
As with other cryptocurrencies, the validity of each ether is provided by a blockchain, which is a continuously growing list of records, called blocks, which are linked and secured using cryptography.[30][31] By design, the blockchain is inherently resistant to modification of the data. It is an open, distributed ledger that records transactions between two parties efficiently and in a verifiable and permanent way.[32] Unlike Bitcoin, Ethereum operates using accounts and balances in a manner called state transitions. This does not rely upon unspent transaction outputs (UTXOs). State denotes the current balances of all accounts and extra data. State is not stored on the blockchain, it is stored in a separate Merkle Patricia tree. A cryptocurrency wallet stores the public and private "keys" or "addresses" which can be used to receive or spend ether. These can be generated through BIP 39 style mnemonics for a BIP 32 "HD Wallet". In Ethereum, this is unnecessary as it does not operate in a UTXO scheme. With the private key, it is possible to write in the blockchain, effectively making an ether transaction.
Third-party internet services called online wallets offer similar functionality but may be easier to use. In this case, credentials to access funds are stored with the online wallet provider rather than on the user's hardware.[97] As a result, the user must have complete trust in the online wallet provider. A malicious provider or a breach in server security may cause entrusted bitcoins to be stolen. An example of such a security breach occurred with Mt. Gox in 2011.[98]
Mining is a record-keeping service done through the use of computer processing power.[e] Miners keep the blockchain consistent, complete, and unalterable by repeatedly grouping newly broadcast transactions into a block, which is then broadcast to the network and verified by recipient nodes.[75] Each block contains a SHA-256 cryptographic hash of the previous block,[75] thus linking it to the previous block and giving the blockchain its name.[7]:ch. 7[75]
×