On 3 January 2009, the bitcoin network was created when Nakamoto mined the first block of the chain, known as the genesis block.[21][22] Embedded in the coinbase of this block was the text "The Times 03/Jan/2009 Chancellor on brink of second bailout for banks".[11] This note references a headline published by The Times and has been interpreted as both a timestamp and a comment on the instability caused by fractional-reserve banking.[23]:18
The use of bitcoin by criminals has attracted the attention of financial regulators, legislative bodies, law enforcement, and the media.[218] In the United States, the FBI prepared an intelligence assessment,[219] the SEC issued a pointed warning about investment schemes using virtual currencies,[218] and the U.S. Senate held a hearing on virtual currencies in November 2013.[220] The U.S. government claimed that bitcoin was used to facilitate payments related to Russian interference in the 2016 United States elections.[221]
تتمتع عملة البيتكوين بقدر عالٍ من السرية. مبدئيا الأمر صحيح، حيث أن كل ما تحتاجه لإرسال بعض البيتكوينات لشخص آخر هو عنوانه فقط. لكن بحكم أنه يتم تسجيل كل عملية تحويل في سجل بيتكوين فإنه بالرغم من عدم معرفتك لهوية مالك أي عُنوان إلا أنه بمقدورك أن تعرف كم عدد البيتكوينات التي في حوزته وما هي العناوين التي أرسلت بيتكوينات إليه. إن قام أحدهم بالإعلان صراحة عن امتلاكه لعناوين بيتكوين مُعينة فإنه سيُصبح بإمكانك معرفة ما هي العناوين التي قامت بإرسال بيتكوينات إليه وما هي العناوين التي أرسل إليها بيتكوينات. الكشف عن عنوان البيتكوين الخاص بك ليس مُستبعدا، حيث أنك ستحتاج إلى إعطائه لغيرك في حال ما إذا احتجت أن يرسلوا لك بعض المال إليه. يُنصح باستخدام عناوين مُختلفة لعمليات تحويل مُختلفة للحفاظ على مُستوى مُعين من المجهولية، رغم ذلك هناك الكثيرون ممن لا يقومون بذلك. من الناحية التقنية يبقى تتبع مصدر بعض العمليات المشبوهة على شبكة بيتكوين مُمكنا، حيث يكفي تتبع عمليات التحويل إلى غاية وصولها إلى عنوان معروفة هوية صاحبه، وحينها يكفي القيام بعمليات تحقيق عكسية إلى غاية الوصول إلى صاحب الحساب المشبوه. صحيح بأن كم البيانات المُتعلقة بجميع عمليات التحويل ضخم، إلا أن قوة الحواسيب في تزايد مُستمر وإمكانية تتبع هذه العمليات واردة جدا، بل ويُمكن الجزم بأنه تتبع عمليات سرقة البيتكوينات أسهل بكثير من تتبع سرقة الأموال على هيئتها الورقية.

In Charles Stross' 2013 science fiction novel, Neptune's Brood, the universal interstellar payment system is known as "bitcoin" and operates using cryptography.[227] Stross later blogged that the reference was intentional, saying "I wrote Neptune's Brood in 2011. Bitcoin was obscure back then, and I figured had just enough name recognition to be a useful term for an interstellar currency: it'd clue people in that it was a networked digital currency."[228]


Mining is a record-keeping service done through the use of computer processing power.[e] Miners keep the blockchain consistent, complete, and unalterable by repeatedly grouping newly broadcast transactions into a block, which is then broadcast to the network and verified by recipient nodes.[75] Each block contains a SHA-256 cryptographic hash of the previous block,[75] thus linking it to the previous block and giving the blockchain its name.[7]:ch. 7[75] 

As can be seen from the data on this page, Ethereum’s price has been enormously volatile and therefore highly unpredictable over the short-term. However, longer-term trends are easier to predict, with fundamental metrics such as the total number of developers, community discussion and GitHub pull requests indicating a more accurate future price trend. Other methods to predict the price of Ethereum include metrics such as Network Value to Transaction ratio (NVT ratio) and the relative prices between coins. The method that we find most interesting is in that of the Ethereum-based prediction market, Augur. These predictions source the “wisdom of the crowd” to determine the likelihood of an outcome occurring and provide a significant level of insight into the market sentiment.
نيمكوين : مليون هو مجموع عملة ال نيمكوين وهذا يعني أن ال نيمكوين ستكون نادرة نسبيا، بالضبط نفس مستوى ندرة ال بيتكوين . هذا وتساعد ال نيمكوين على إنشاء الإنترنت الغير خاضعة للرقابة، وتنكر السيطرة الحكومية. وهي منصة متعددة الاستخدامات يمكن استخدامها لنظام أسماء النطاقات الغير مركزي والغير منظم، نوع من الإنترنت الخاصة بها. ويمكن أيضا أن تستخدم لإرسال الرسائل، والتصويت، ونظام تسجيل الدخول.
Using Ethereum’s “Turing complete” smart contract language, Solidity, developers are able to deploy a set of instructions to the blockchain that operate indefinitely with a high degree of finality and fraud-resistance. With the first block being mined in July 2015, Ethereum has since become the largest smart contract platform of its kind, and the second largest blockchain of all time as measured by market capitalization.
Ethereum is the pioneer for blockchain based smart contracts. When running on the blockchain a smart contract becomes like a self-operating computer program that automatically executes when specific conditions are met. On the blockchain, smart contracts allow for code to be run exactly as programmed without any possibility of downtime, censorship, fraud or third-party interference. It can facilitate the exchange of money, content, property, shares, or anything of value. The Ethereum network went live on July 30th, 2015 with 72 million Ethereum premined.
As with other cryptocurrencies, the validity of each ether is provided by a blockchain, which is a continuously growing list of records, called blocks, which are linked and secured using cryptography.[30][31] By design, the blockchain is inherently resistant to modification of the data. It is an open, distributed ledger that records transactions between two parties efficiently and in a verifiable and permanent way.[32] Unlike Bitcoin, Ethereum operates using accounts and balances in a manner called state transitions. This does not rely upon unspent transaction outputs (UTXOs). State denotes the current balances of all accounts and extra data. State is not stored on the blockchain, it is stored in a separate Merkle Patricia tree. A cryptocurrency wallet stores the public and private "keys" or "addresses" which can be used to receive or spend ether. These can be generated through BIP 39 style mnemonics for a BIP 32 "HD Wallet". In Ethereum, this is unnecessary as it does not operate in a UTXO scheme. With the private key, it is possible to write in the blockchain, effectively making an ether transaction.
While it’s still early days, Mist, MetaMask and a variety of other browsers look set to make blockchain-based applications accessible to more people than ever before. Even people without a technical background can now potentially build blockchain apps. This is a revolutionary leap for blockchain technology that could bring decentralized applications into the mainstream.
^ Jump up to: a b c d "Statement of Jennifer Shasky Calvery, Director Financial Crimes Enforcement Network United States Department of the Treasury Before the United States Senate Committee on Banking, Housing, and Urban Affairs Subcommittee on National Security and International Trade and Finance Subcommittee on Economic Policy" (PDF). fincen.gov. Financial Crimes Enforcement Network. 19 November 2013. Archived (PDF) from the original on 9 October 2016. Retrieved 1 June 2014. 

Wallets and similar software technically handle all bitcoins as equivalent, establishing the basic level of fungibility. Researchers have pointed out that the history of each bitcoin is registered and publicly available in the blockchain ledger, and that some users may refuse to accept bitcoins coming from controversial transactions, which would harm bitcoin's fungibility.[123] For example, in 2012, Mt. Gox froze accounts of users who deposited bitcoins that were known to have just been stolen.[124]
×