لضمان صحّة عمليات التحويل، يقوم نظام البيتكوين بالاحتفاظ بسجل حسابات تُسجل فيه جميع الإجراءات التي تتم على الشبكة يُطلق عليه اسم سلسلة الكُتل (بالإنجليزية: block chain). تتشارك جميع العُقد المتواجدة على شبكة البيتكوين هذا السجل عبر نظام يعتمد على بروتوكول بِتكُيِن. تحتوي سلسلة الكُتل على جميع الإجراءات التي تمت باستخدام بِتكُيِن، وهو ما يُمكن من معرفة الرصيد الذي يملكه كل عنوان على هذه الشبكة. يُطلق على هذا المفهوم وصف السلسلة للترابط المتواجد ما بين الكُتل، حيث تحتوي كل كُتلة على هاش الكُتلة التي تسبقها ويتواصل الأمر إلى غاية الوصول إلى الكُتلة الأولى التي يُطلق عليها اسم "كتلة التكوين" (بالإنجليزية: genesis block) . تكوين السلسلة بهذه الطريقة يجعل من مهمة تغيير أي كُتلة بعد مرور مُدة مُعينة على إنشائها في غاية الصعوبة، حيث أن تغيير أي كُتلة يتطلب تغيير كل الكُتل التي تليها بسبب الحاجة إلى إعادة حساب هاش كل كُتلة لتحديث قيمة هاش الكُتلة السابقة فيها. هذه الخاصية هي ما يجعل من مُشكل الإنفاق المُتكرر لنفس العُملات في غاية الصعوبة على بِتكُيِن، بل ويُمكن اعتبار سلسلة الكُتل العمود الفقري الذي لا يُمكن لعُملة بِتكُيِن الوقوف من دونه[10].
Nigel Dodd argues in The Social Life of Bitcoin that the essence of the bitcoin ideology is to remove money from social, as well as governmental, control.[131] Dodd quotes a YouTube video, with Roger Ver, Jeff Berwick, Charlie Shrem, Andreas Antonopoulos, Gavin Wood, Trace Meyer and other proponents of bitcoin reading The Declaration of Bitcoin's Independence. The declaration includes a message of crypto-anarchism with the words: "Bitcoin is inherently anti-establishment, anti-system, and anti-state. Bitcoin undermines governments and disrupts institutions because bitcoin is fundamentally humanitarian."[131][130]
Physical wallets can also take the form of metal token coins[102] with a private key accessible under a security hologram in a recess struck on the reverse side.[103]:38 The security hologram self-destructs when removed from the token, showing that the private key has been accessed.[104] Originally, these tokens were struck in brass and other base metals, but later used precious metals as bitcoin grew in value and popularity.[103]:80 Coins with stored face value as high as ₿1000 have been struck in gold.[103]:102–104 The British Museum's coin collection includes four specimens from the earliest series[103]:83 of funded bitcoin tokens; one is currently on display in the museum's money gallery.[105] In 2013, a Utahn manufacturer of these tokens was ordered by the Financial Crimes Enforcement Network (FinCEN) to register as a money services business before producing any more funded bitcoin tokens.[102][103]:80
A wallet stores the information necessary to transact bitcoins. While wallets are often described as a place to hold[93] or store bitcoins, due to the nature of the system, bitcoins are inseparable from the blockchain transaction ledger. A wallet is more correctly defined as something that "stores the digital credentials for your bitcoin holdings" and allows one to access (and spend) them.[7]:ch. 1, glossary Bitcoin uses public-key cryptography, in which two cryptographic keys, one public and one private, are generated.[94] At its most basic, a wallet is a collection of these keys.
Ethereum's smart contracts are based on different computer languages, which developers use to program their own functionalities. Smart contracts are high-level programming abstractions that are compiled down to EVM bytecode and deployed to the Ethereum blockchain for execution. They can be written in Solidity (a language library with similarities to C and JavaScript), Serpent (similar to Python, but deprecated), LLL (a low-level Lisp-like language), and Mutan (Go-based, but deprecated). There is also a research-oriented language under development called Vyper (a strongly-typed Python-derived decidable language).

Mining is a record-keeping service done through the use of computer processing power.[e] Miners keep the blockchain consistent, complete, and unalterable by repeatedly grouping newly broadcast transactions into a block, which is then broadcast to the network and verified by recipient nodes.[75] Each block contains a SHA-256 cryptographic hash of the previous block,[75] thus linking it to the previous block and giving the blockchain its name.[7]:ch. 7[75]

• عدم الإعتراف بها من قبل الجهات المُختصة: إستناداً إلى قول الإمام ابن تيمية: ’’الدراهم والدنانير لا تقصد لنفسها بل هي وسيلة إلى التعامل بها، ولهذا كانت أثمانا بخلاف سائر الأموال، فإن – هذه الاموال – المقصود الإنتفاع بها نفسها”. وفي وقتنا الحالى لا تعتمد تداول وإستثمار العُملات إلا بموجب إعتراف وموافقة من قبل الجهات المُختصة وعلى رأسها البنوك المركزية. وبحسب ما قُيل من قبل البنوك المركزية إنه لم يتم الإعتراف بعد بعُملات البيتكوين الإفتراضية كعٌملات صالحة للتداول والإستثمار. وطبقاً لذلك تُحرم عمليات التداول والإستثمار للبيتكوين.
By comparison to government-backed global currencies, Bitcoin remains fairly complex for the typical user to acquire and use in regular transactions. Growing interest and significant global investments in Bitcoin wallet and Blockchain technology have nonetheless made buying and selling Bitcoin far more accessible to the average user. And indeed growing acceptance by government entities have ameliorated the ambiguity of legal and regulatory status for Bitcoin and Bitcoin exchanges.
Third-party internet services called online wallets offer similar functionality but may be easier to use. In this case, credentials to access funds are stored with the online wallet provider rather than on the user's hardware.[97] As a result, the user must have complete trust in the online wallet provider. A malicious provider or a breach in server security may cause entrusted bitcoins to be stolen. An example of such a security breach occurred with Mt. Gox in 2011.[98]
Researchers have pointed out at a "trend towards centralization". Although bitcoin can be sent directly from user to user, in practice intermediaries are widely used.[32]:220–222 Bitcoin miners join large mining pools to minimize the variance of their income.[32]:215, 219–222[115]:3[116] Because transactions on the network are confirmed by miners, decentralization of the network requires that no single miner or mining pool obtains 51% of the hashing power, which would allow them to double-spend coins, prevent certain transactions from being verified and prevent other miners from earning income.[117] As of 2013 just six mining pools controlled 75% of overall bitcoin hashing power.[117] In 2014 mining pool Ghash.io obtained 51% hashing power which raised significant controversies about the safety of the network. The pool has voluntarily capped their hashing power at 39.99% and requested other pools to act responsibly for the benefit of the whole network.[118] Between 2017 and 2019 over 70% of the hashing power and 90% of transactions were operating from China.[119]
In October 2015,[63] a development governance was proposed as Ethereum Improvement Proposal, aka EIP, standardized on EIP-1.[64] The core development group and community were to gain consensus by a process regulated EIP. A few notable decisions were made in the process of EIP, such as EIP-160 (EXP cost increase caused by Spurious Dragon Hardfork)[65] and EIP-20 (ERC-20 Token Standard).[66] In January 2018, the EIP process was finalized and published as EIP-1 status turned "active".[63]
An official investigation into bitcoin traders was reported in May 2018.[177] The U.S. Justice Department launched an investigation into possible price manipulation, including the techniques of spoofing and wash trades.[178][179][180] Traders in the U.S., the U.K, South Korea, and possibly other countries are being investigated.[177] Brett Redfearn, head of the U.S. Securities and Exchange Commission's Division of Trading and Markets, had identified several manipulation techniques of concern in March 2018.
Using Ethereum’s “Turing complete” smart contract language, Solidity, developers are able to deploy a set of instructions to the blockchain that operate indefinitely with a high degree of finality and fraud-resistance. With the first block being mined in July 2015, Ethereum has since become the largest smart contract platform of its kind, and the second largest blockchain of all time as measured by market capitalization.
Full clients verify transactions directly by downloading a full copy of the blockchain (over 150 GB As of January 2018).[95] They are the most secure and reliable way of using the network, as trust in external parties is not required. Full clients check the validity of mined blocks, preventing them from transacting on a chain that breaks or alters network rules.[7]:ch. 1 Because of its size and complexity, downloading and verifying the entire blockchain is not suitable for all computing devices.
Bitcoin is a digital currency, sometimes referred to as a cryptocurrency, best known as the world's first truly decentralized digital currency. Bitcoin is traded on a peer-to-peer basis with a distributed ledger called the Blockchain, and the Bitcoin exchange rate to the US Dollar and other major currencies is determined by supply and demand as with other global exchange rates. The traded value of Bitcoin has proven volatile through various booms and busts in demand. Ultimately, however, many see Bitcoin as a store of value against government-backed fiat currencies.
While another less aggressive soft fork solution was put forth, the Ethereum community and its founders were placed in a perilous position. If they didn’t retrieve the stolen investor money, confidence in Ethereum could be lost. On the other hand, recovering investor money required actions that went against the core ideas of decentralization and set a dangerous precedent.
While another less aggressive soft fork solution was put forth, the Ethereum community and its founders were placed in a perilous position. If they didn’t retrieve the stolen investor money, confidence in Ethereum could be lost. On the other hand, recovering investor money required actions that went against the core ideas of decentralization and set a dangerous precedent.
Ethereum was announced at the North American Bitcoin Conference in Miami, in January, 2014.[9] During the same time as the conference, a group of people rented a house in Miami Gavin Wood, Charles Hoskinson, and Anthony Di Iorio, a Torontonian who financed the project.[9] Di Iorio invited friend Joseph Lubin, who invited reporter Morgen Peck, to bear witness.[9] Six months later the founders met again in a house in Zug Switzerland, where Buterin told the founders that the project would proceed as a non-profit. Hoskinson left the project at that time.[9]
تتمتع عملة البيتكوين بقدر عالٍ من السرية. مبدئيا الأمر صحيح، حيث أن كل ما تحتاجه لإرسال بعض البيتكوينات لشخص آخر هو عنوانه فقط. لكن بحكم أنه يتم تسجيل كل عملية تحويل في سجل بيتكوين فإنه بالرغم من عدم معرفتك لهوية مالك أي عُنوان إلا أنه بمقدورك أن تعرف كم عدد البيتكوينات التي في حوزته وما هي العناوين التي أرسلت بيتكوينات إليه. إن قام أحدهم بالإعلان صراحة عن امتلاكه لعناوين بيتكوين مُعينة فإنه سيُصبح بإمكانك معرفة ما هي العناوين التي قامت بإرسال بيتكوينات إليه وما هي العناوين التي أرسل إليها بيتكوينات. الكشف عن عنوان البيتكوين الخاص بك ليس مُستبعدا، حيث أنك ستحتاج إلى إعطائه لغيرك في حال ما إذا احتجت أن يرسلوا لك بعض المال إليه. يُنصح باستخدام عناوين مُختلفة لعمليات تحويل مُختلفة للحفاظ على مُستوى مُعين من المجهولية، رغم ذلك هناك الكثيرون ممن لا يقومون بذلك. من الناحية التقنية يبقى تتبع مصدر بعض العمليات المشبوهة على شبكة بيتكوين مُمكنا، حيث يكفي تتبع عمليات التحويل إلى غاية وصولها إلى عنوان معروفة هوية صاحبه، وحينها يكفي القيام بعمليات تحقيق عكسية إلى غاية الوصول إلى صاحب الحساب المشبوه. صحيح بأن كم البيانات المُتعلقة بجميع عمليات التحويل ضخم، إلا أن قوة الحواسيب في تزايد مُستمر وإمكانية تتبع هذه العمليات واردة جدا، بل ويُمكن الجزم بأنه تتبع عمليات سرقة البيتكوينات أسهل بكثير من تتبع سرقة الأموال على هيئتها الورقية.
Though transaction fees are optional, miners can choose which transactions to process and prioritize those that pay higher fees.[77] Miners may choose transactions based on the fee paid relative to their storage size, not the absolute amount of money paid as a fee. These fees are generally measured in satoshis per byte (sat/b). The size of transactions is dependent on the number of inputs used to create the transaction, and the number of outputs.[7]:ch. 8
The Ethereum Virtual Machine (EVM) is the runtime environment for smart contracts in Ethereum. It is a 256-bit register stack, designed to run the same code exactly as intended. It is the fundamental consensus mechanism for Ethereum. The formal definition of the EVM is specified in the Ethereum Yellow Paper.[34][37] On February 1, 2018, there were 27,500 nodes in the main Ethereum network.[38] Ethereum Virtual Machines have been implemented in C++, Go, Haskell, Java, JavaScript, Python, Ruby, Rust, Elixir, Erlang, and soon, WebAssembly (currently under development).
Mining is a record-keeping service done through the use of computer processing power.[e] Miners keep the blockchain consistent, complete, and unalterable by repeatedly grouping newly broadcast transactions into a block, which is then broadcast to the network and verified by recipient nodes.[75] Each block contains a SHA-256 cryptographic hash of the previous block,[75] thus linking it to the previous block and giving the blockchain its name.[7]:ch. 7[75]
تُعتبر بيتكوين عُملة معمّاة (بالإنجليزية: cryptocurrency) ويُقصد بذلك أنها تعتمد بشكل أساسي على مبادئ التشفير في جميع جوانبها، كما أنها تُعتبر أيضا العُملة الأولى من نوعها والأكثر شهرة وانتشارًا لكن رغم ذلك ليست العُملة التشفيرية الوحيدة الموجودة على شبكة الإنترنت حاليًا. حيث يتوفر ما يزيد عن 60 عُملة تشفيرية مُختلفة[6] منها 6 عُملات يُمكن وصفها بالرئيسية [7] وذلك اعتمادًا على عدد المُستخدمين وبنية كل شبكة، إضافة إلى الأماكن التي يُمكن استبدال وشراء هذه العُملات التشفيرية مُقابل عُملات أخرى. جميع العُملات التشفيرية الحالية مبنية على مبدأ عمل عُملة بيتكوين نفسها باستثناء عُملة Ripple [8]، وبما أن عُملة بيتكوين مفتوحة المصدر فإنه من المُمكن استنساخها وإدخال بعض التعديلات عليها ومن ثم إطلاق عُملة جديدة.
Because of bitcoin's decentralized nature and its trading on online exchanges located in many countries, regulation of bitcoin has been difficult. However, the use of bitcoin can be criminalized, and shutting down exchanges and the peer-to-peer economy in a given country would constitute a de facto ban.[167] The legal status of bitcoin varies substantially from country to country and is still undefined or changing in many of them. Regulations and bans that apply to bitcoin probably extend to similar cryptocurrency systems.[168]
Though transaction fees are optional, miners can choose which transactions to process and prioritize those that pay higher fees.[77] Miners may choose transactions based on the fee paid relative to their storage size, not the absolute amount of money paid as a fee. These fees are generally measured in satoshis per byte (sat/b). The size of transactions is dependent on the number of inputs used to create the transaction, and the number of outputs.[7]:ch. 8
If the private key is lost, the bitcoin network will not recognize any other evidence of ownership;[32] the coins are then unusable, and effectively lost. For example, in 2013 one user claimed to have lost 7,500 bitcoins, worth $7.5 million at the time, when he accidentally discarded a hard drive containing his private key.[78] About 20% of all bitcoins are believed to be lost. They would have a market value of about $20 billion at July 2018 prices.[79]
• عدم الإعتراف بها من قبل الجهات المُختصة: إستناداً إلى قول الإمام ابن تيمية: ’’الدراهم والدنانير لا تقصد لنفسها بل هي وسيلة إلى التعامل بها، ولهذا كانت أثمانا بخلاف سائر الأموال، فإن – هذه الاموال – المقصود الإنتفاع بها نفسها”. وفي وقتنا الحالى لا تعتمد تداول وإستثمار العُملات إلا بموجب إعتراف وموافقة من قبل الجهات المُختصة وعلى رأسها البنوك المركزية. وبحسب ما قُيل من قبل البنوك المركزية إنه لم يتم الإعتراف بعد بعُملات البيتكوين الإفتراضية كعٌملات صالحة للتداول والإستثمار. وطبقاً لذلك تُحرم عمليات التداول والإستثمار للبيتكوين.
تُعتبر بيتكوين عُملة معمّاة (بالإنجليزية: cryptocurrency) ويُقصد بذلك أنها تعتمد بشكل أساسي على مبادئ التشفير في جميع جوانبها، كما أنها تُعتبر أيضا العُملة الأولى من نوعها والأكثر شهرة وانتشارًا لكن رغم ذلك ليست العُملة التشفيرية الوحيدة الموجودة على شبكة الإنترنت حاليًا. حيث يتوفر ما يزيد عن 60 عُملة تشفيرية مُختلفة[6] منها 6 عُملات يُمكن وصفها بالرئيسية [7] وذلك اعتمادًا على عدد المُستخدمين وبنية كل شبكة، إضافة إلى الأماكن التي يُمكن استبدال وشراء هذه العُملات التشفيرية مُقابل عُملات أخرى. جميع العُملات التشفيرية الحالية مبنية على مبدأ عمل عُملة بيتكوين نفسها باستثناء عُملة Ripple [8]، وبما أن عُملة بيتكوين مفتوحة المصدر فإنه من المُمكن استنساخها وإدخال بعض التعديلات عليها ومن ثم إطلاق عُملة جديدة.
Despite the fallout from The DAO hack, Ethereum is moving forward and looking to a bright future. By providing a user-friendly platform that enables people to harness the power of blockchain technology, Ethereum is speeding up the decentralization of the world economy. Decentralized applications have the potential to profoundly disrupt hundreds of industries including finance, real estate, academia, insurance, healthcare and the public sector amongst many others.

^ Jump up to: a b c d "Statement of Jennifer Shasky Calvery, Director Financial Crimes Enforcement Network United States Department of the Treasury Before the United States Senate Committee on Banking, Housing, and Urban Affairs Subcommittee on National Security and International Trade and Finance Subcommittee on Economic Policy" (PDF). fincen.gov. Financial Crimes Enforcement Network. 19 November 2013. Archived (PDF) from the original on 9 October 2016. Retrieved 1 June 2014.
Both blockchains have the same features and are identical in every way up to a certain block where the hard-fork was implemented. This means that everything that happened on Ethereum up until the hard-fork is still valid on the Ethereum Classic Blockchain. From the block where the hard fork or change in code was executed onwards, the two blockchains act individually.
طرح شخص أطلق على نفسه الاسم الرمزي ساتوشي ناكاموتو فكرة بيتكوين للمرة الأولى في ورقة بحثية في عام 2008،[2] ووصفها بأنها نظام نقدي إلكتروني يعتمد في التعاملات المالية على مبدأ الند للند (بالإنجليزية: Peer-to-Peer) ، وهو مصطلح تقني يعني التعامل المباشر بين مستخدم وآخر دون وجود وسيط (كالتورنت). يقول القائمون على بيتكوين إن الهدف من هذه العملة التي طرحت للتداول للمرة الأولى سنة 2009 [3] هو تغيير الاقتصاد العالمي بنفس الطريقة التي غيرت بها الويب أساليب النشر.[4] وفي عام 2016 أعلن رجل الأعمال الأسترالي كريغ رايت أنه هو ساتوشي ناكاموتو مقدما دليلا تقنيا على ذلك ولكن تم كشف زيف أدلّته بسهولة.[5]
On 3 January 2009, the bitcoin network was created when Nakamoto mined the first block of the chain, known as the genesis block.[21][22] Embedded in the coinbase of this block was the text "The Times 03/Jan/2009 Chancellor on brink of second bailout for banks".[11] This note references a headline published by The Times and has been interpreted as both a timestamp and a comment on the instability caused by fractional-reserve banking.[23]:18
Both blockchains have the same features and are identical in every way up to a certain block where the hard-fork was implemented. This means that everything that happened on Ethereum up until the hard-fork is still valid on the Ethereum Classic Blockchain. From the block where the hard fork or change in code was executed onwards, the two blockchains act individually.
Izabella Kaminska, the editor of FT Alphaville, has pointed out that criminals are using Ethereum to run Ponzi schemes and other forms of investment fraud.[67] The article was based on a paper from the University of Cagliari, which placed the number of Ethereum smart contracts which facilitate Ponzi schemes at nearly 10% of 1384 smart contracts examined. However, it also estimated that only 0.05% of the transactions on the network were related to such contracts.[68]

Transactions are defined using a Forth-like scripting language.[7]:ch. 5 Transactions consist of one or more inputs and one or more outputs. When a user sends bitcoins, the user designates each address and the amount of bitcoin being sent to that address in an output. To prevent double spending, each input must refer to a previous unspent output in the blockchain.[77] The use of multiple inputs corresponds to the use of multiple coins in a cash transaction. Since transactions can have multiple outputs, users can send bitcoins to multiple recipients in one transaction. As in a cash transaction, the sum of inputs (coins used to pay) can exceed the intended sum of payments. In such a case, an additional output is used, returning the change back to the payer.[77] Any input satoshis not accounted for in the transaction outputs become the transaction fee.[77]
Another type of physical wallet called a hardware wallet keeps credentials offline while facilitating transactions.[106] The hardware wallet acts as a computer peripheral and signs transactions as requested by the user, who must press a button on the wallet to confirm that they intended to make the transaction. Hardware wallets never expose their private keys, keeping bitcoins in cold storage even when used with computers that may be compromised by malware.[99]:42–45
×