If the private key is lost, the bitcoin network will not recognize any other evidence of ownership;[32] the coins are then unusable, and effectively lost. For example, in 2013 one user claimed to have lost 7,500 bitcoins, worth $7.5 million at the time, when he accidentally discarded a hard drive containing his private key.[78] About 20% of all bitcoins are believed to be lost. They would have a market value of about $20 billion at July 2018 prices.[79]
• غطاء تمويلى للمنظمات الإرهابية: قامت دار الإفتاء المصرية بتصريح أن عمليات الإستثمار والتداول في البيتكوين تُعتبر عمليات مُحرمة من قبل الدين والشرع حيث إنها تعمل كغطاء لتمويل المنظمات الإرهابية وعصابات المُخدرات. كما لعدم وجود هيئات حكومية وبنوك مركزية كان لذلك آثر رهيب على استخدام إستثمارات البيتكوين في عمليات غسيل الأموال والتى بالطبع نهانا الرسول عنها، بل ويُحاسب عليها القانون أيضاً.

Every 2,016 blocks (approximately 14 days at roughly 10 min per block), the difficulty target is adjusted based on the network's recent performance, with the aim of keeping the average time between new blocks at ten minutes. In this way the system automatically adapts to the total amount of mining power on the network.[7]:ch. 8 Between 1 March 2014 and 1 March 2015, the average number of nonces miners had to try before creating a new block increased from 16.4 quintillion to 200.5 quintillion.[86]
Any services that are centralized can be decentralized using Ethereum. Think about all the intermediary services that exist across hundreds of different industries. From obvious services like loans provided by banks to intermediary services rarely thought about by most people like title registries, voting systems, regulatory compliance and much more.

^ Jump up to: a b c d "Statement of Jennifer Shasky Calvery, Director Financial Crimes Enforcement Network United States Department of the Treasury Before the United States Senate Committee on Banking, Housing, and Urban Affairs Subcommittee on National Security and International Trade and Finance Subcommittee on Economic Policy" (PDF). fincen.gov. Financial Crimes Enforcement Network. 19 November 2013. Archived (PDF) from the original on 9 October 2016. Retrieved 1 June 2014.
A wallet stores the information necessary to transact bitcoins. While wallets are often described as a place to hold[93] or store bitcoins, due to the nature of the system, bitcoins are inseparable from the blockchain transaction ledger. A wallet is more correctly defined as something that "stores the digital credentials for your bitcoin holdings" and allows one to access (and spend) them.[7]:ch. 1, glossary Bitcoin uses public-key cryptography, in which two cryptographic keys, one public and one private, are generated.[94] At its most basic, a wallet is a collection of these keys. 

Augur is an open-source prediction & forecasting market platform that allows anyone to forecast events and get rewarded for predicting them correctly. Predictions on future real world events, like who will win the next US election, are carried out by trading virtual shares. If a person buys shares in a winning prediction, they receive monetary rewards.
To lower the costs, bitcoin miners have set up in places like Iceland where geothermal energy is cheap and cooling Arctic air is free.[205] Bitcoin miners are known to use hydroelectric power in Tibet, Quebec, Washington (state), and Austria to reduce electricity costs.[204][206] Miners are attracted to suppliers such as Hydro Quebec that have energy surpluses.[207] According to a University of Cambridge study, much of bitcoin mining is done in China, where electricity is subsidized by the government.[208][209]
الجدير بالذكر بأن بعض المواقع كانت تنشر سابقا تقديرا لمقدار الخسارة/ الربح الذي يُسجله المنقبون لكن يبدو بأنهم توقفوا عن القيام بذلك لأسباب نجهلها. قد يعتقد البعض بأنه لم يكن بالإمكان إعطاء تقدير دقيق لمقدار الخسارة أو الربح الذي يُسجله المنقبون، ولذلك تم التخلص من ذلك. إلا أنه من المُمكن جدا أنه تم التخلص من ذلك لكيلا يتم تنفير المُنقبين من عمليات التنقيب.
While it’s still early days, Mist, MetaMask and a variety of other browsers look set to make blockchain-based applications accessible to more people than ever before. Even people without a technical background can now potentially build blockchain apps. This is a revolutionary leap for blockchain technology that could bring decentralized applications into the mainstream.
Any services that are centralized can be decentralized using Ethereum. Think about all the intermediary services that exist across hundreds of different industries. From obvious services like loans provided by banks to intermediary services rarely thought about by most people like title registries, voting systems, regulatory compliance and much more.

While another less aggressive soft fork solution was put forth, the Ethereum community and its founders were placed in a perilous position. If they didn’t retrieve the stolen investor money, confidence in Ethereum could be lost. On the other hand, recovering investor money required actions that went against the core ideas of decentralization and set a dangerous precedent.

تُعتبر بيتكوين عُملة معمّاة (بالإنجليزية: cryptocurrency) ويُقصد بذلك أنها تعتمد بشكل أساسي على مبادئ التشفير في جميع جوانبها، كما أنها تُعتبر أيضا العُملة الأولى من نوعها والأكثر شهرة وانتشارًا لكن رغم ذلك ليست العُملة التشفيرية الوحيدة الموجودة على شبكة الإنترنت حاليًا. حيث يتوفر ما يزيد عن 60 عُملة تشفيرية مُختلفة[6] منها 6 عُملات يُمكن وصفها بالرئيسية [7] وذلك اعتمادًا على عدد المُستخدمين وبنية كل شبكة، إضافة إلى الأماكن التي يُمكن استبدال وشراء هذه العُملات التشفيرية مُقابل عُملات أخرى. جميع العُملات التشفيرية الحالية مبنية على مبدأ عمل عُملة بيتكوين نفسها باستثناء عُملة Ripple [8]، وبما أن عُملة بيتكوين مفتوحة المصدر فإنه من المُمكن استنساخها وإدخال بعض التعديلات عليها ومن ثم إطلاق عُملة جديدة.
Another type of physical wallet called a hardware wallet keeps credentials offline while facilitating transactions.[106] The hardware wallet acts as a computer peripheral and signs transactions as requested by the user, who must press a button on the wallet to confirm that they intended to make the transaction. Hardware wallets never expose their private keys, keeping bitcoins in cold storage even when used with computers that may be compromised by malware.[99]:42–45
“A DAO consists of one or more contracts and could be funded by a group of like-minded individuals. A DAO operates completely transparently and completely independently of any human intervention, including its original creators. A DAO will stay on the network as long as it covers its survival costs and provides a useful service to its customer base” Stephen Tual, Slock.it Founder, former CCO Ethereum.
تُعتبر بيتكوين عُملة معمّاة (بالإنجليزية: cryptocurrency) ويُقصد بذلك أنها تعتمد بشكل أساسي على مبادئ التشفير في جميع جوانبها، كما أنها تُعتبر أيضا العُملة الأولى من نوعها والأكثر شهرة وانتشارًا لكن رغم ذلك ليست العُملة التشفيرية الوحيدة الموجودة على شبكة الإنترنت حاليًا. حيث يتوفر ما يزيد عن 60 عُملة تشفيرية مُختلفة[6] منها 6 عُملات يُمكن وصفها بالرئيسية [7] وذلك اعتمادًا على عدد المُستخدمين وبنية كل شبكة، إضافة إلى الأماكن التي يُمكن استبدال وشراء هذه العُملات التشفيرية مُقابل عُملات أخرى. جميع العُملات التشفيرية الحالية مبنية على مبدأ عمل عُملة بيتكوين نفسها باستثناء عُملة Ripple [8]، وبما أن عُملة بيتكوين مفتوحة المصدر فإنه من المُمكن استنساخها وإدخال بعض التعديلات عليها ومن ثم إطلاق عُملة جديدة.
Ethereum is also being used as a platform to launch other cryptocurrencies. Because of the ERC20 token standard defined by the Ethereum Foundation, other developers can issue their own versions of this token and raise funds with an initial coin offering (ICO). In this fundraising strategy, the issuers of the token set an amount they want to raise, offer it in a crowdsale, and receive Ether in exchange. Billions of dollars have been raised by ICOs on the Ethereum platform in the last two years, and one of the most valuable cryptocurrencies in the world, EOS, is an ERC20 token.
Bitcoin has been criticized for the amount of electricity consumed by mining. As of 2015, The Economist estimated that even if all miners used modern facilities, the combined electricity consumption would be 166.7 megawatts (1.46 terawatt-hours per year).[136] At the end of 2017, the global bitcoin mining activity was estimated to consume between one and four gigawatts of electricity.[203] Politico noted that the even high-end estimates of bitcoin's total consumption levels amount to only about 6% of the total power consumed by the global banking sector, and even if bitcoin's consumption levels increased 100 fold from today's levels, bitcoin's consumption would still only amount to about 2% of global power consumption.[204]
Full clients verify transactions directly by downloading a full copy of the blockchain (over 150 GB As of January 2018).[95] They are the most secure and reliable way of using the network, as trust in external parties is not required. Full clients check the validity of mined blocks, preventing them from transacting on a chain that breaks or alters network rules.[7]:ch. 1 Because of its size and complexity, downloading and verifying the entire blockchain is not suitable for all computing devices.
بروتوكول اكتشاف الجيران (NDP) بروتوكول حل العناوين (ARP) بروتوكولات نفقيّة (بروتوكول الأنفاق في الطبقة الثانية) بروتوكول الربط بين نقطتين (PPP) بروتوكول الشجرة المُتفرعة (STP) الواجهة البينية للبيانات الموزعة بالألياف (FDDI) تبديل الأطر الإيثرنت (IEEE 802.3). الشبكات المحليّة اللاسلكيّة (IEEE 802.11) الشبكات الشخصية اللاسلكية (IEEE 802.15) البلوتوث (IEEE 802.15.1) الشبكات الشخصية اللاسلكية منخفضة المعدل (IEEE 802.15.4) مزيد ..
رغم وجود مجموعة محدودة نسبيا من المواقع التي تقبل دفعات بيتكوين لقاء منتجاتها، مقارنةً بالمواقع التي تتعامل بالعملات التقليدية، فإن بيتكوين مدعومة من مجموعة متزايدة من المواقع، من بينها شركات ومواقع كبيرة ومتنوعة، مثل مواقع بيع خدمات الاستضافة وحجز أسماء النطاق والشبكات الاجتماعية ومواقع الفيديو والموسيقى والمواقع المتنوعة التي تبيع مختلف أنواع المنتجات.
The Ethereum Virtual Machine (EVM) is the runtime environment for smart contracts in Ethereum. It is a 256-bit register stack, designed to run the same code exactly as intended. It is the fundamental consensus mechanism for Ethereum. The formal definition of the EVM is specified in the Ethereum Yellow Paper.[34][37] On February 1, 2018, there were 27,500 nodes in the main Ethereum network.[38] Ethereum Virtual Machines have been implemented in C++, Go, Haskell, Java, JavaScript, Python, Ruby, Rust, Elixir, Erlang, and soon, WebAssembly (currently under development).
In the blockchain, bitcoins are registered to bitcoin addresses. Creating a bitcoin address requires nothing more than picking a random valid private key and computing the corresponding bitcoin address. This computation can be done in a split second. But the reverse, computing the private key of a given bitcoin address, is mathematically unfeasible. Users can tell others or make public a bitcoin address without compromising its corresponding private key. Moreover, the number of valid private keys is so vast that it is extremely unlikely someone will compute a key-pair that is already in use and has funds. The vast number of valid private keys makes it unfeasible that brute force could be used to compromise a private key. To be able to spend their bitcoins, the owner must know the corresponding private key and digitally sign the transaction. The network verifies the signature using the public key; the private key is never revealed.[7]:ch. 5
Because of bitcoin's decentralized nature and its trading on online exchanges located in many countries, regulation of bitcoin has been difficult. However, the use of bitcoin can be criminalized, and shutting down exchanges and the peer-to-peer economy in a given country would constitute a de facto ban.[167] The legal status of bitcoin varies substantially from country to country and is still undefined or changing in many of them. Regulations and bans that apply to bitcoin probably extend to similar cryptocurrency systems.[168]
تتمتع عملة البيتكوين بقدر عالٍ من السرية. مبدئيا الأمر صحيح، حيث أن كل ما تحتاجه لإرسال بعض البيتكوينات لشخص آخر هو عنوانه فقط. لكن بحكم أنه يتم تسجيل كل عملية تحويل في سجل بيتكوين فإنه بالرغم من عدم معرفتك لهوية مالك أي عُنوان إلا أنه بمقدورك أن تعرف كم عدد البيتكوينات التي في حوزته وما هي العناوين التي أرسلت بيتكوينات إليه. إن قام أحدهم بالإعلان صراحة عن امتلاكه لعناوين بيتكوين مُعينة فإنه سيُصبح بإمكانك معرفة ما هي العناوين التي قامت بإرسال بيتكوينات إليه وما هي العناوين التي أرسل إليها بيتكوينات. الكشف عن عنوان البيتكوين الخاص بك ليس مُستبعدا، حيث أنك ستحتاج إلى إعطائه لغيرك في حال ما إذا احتجت أن يرسلوا لك بعض المال إليه. يُنصح باستخدام عناوين مُختلفة لعمليات تحويل مُختلفة للحفاظ على مُستوى مُعين من المجهولية، رغم ذلك هناك الكثيرون ممن لا يقومون بذلك. من الناحية التقنية يبقى تتبع مصدر بعض العمليات المشبوهة على شبكة بيتكوين مُمكنا، حيث يكفي تتبع عمليات التحويل إلى غاية وصولها إلى عنوان معروفة هوية صاحبه، وحينها يكفي القيام بعمليات تحقيق عكسية إلى غاية الوصول إلى صاحب الحساب المشبوه. صحيح بأن كم البيانات المُتعلقة بجميع عمليات التحويل ضخم، إلا أن قوة الحواسيب في تزايد مُستمر وإمكانية تتبع هذه العمليات واردة جدا، بل ويُمكن الجزم بأنه تتبع عمليات سرقة البيتكوينات أسهل بكثير من تتبع سرقة الأموال على هيئتها الورقية.
J. P. Morgan Chase is developing JPM Coin on a permissioned-variant of Ethereum blockchain dubbed "Quorum".[53] It's designed to toe the line between private and public in the realm of shuffling derivatives and payments. The idea is to satisfy regulators who need seamless access to financial goings-on, while protecting the privacy of parties that don't wish to reveal their identities nor the details of their transactions to the general public.[54]

Ethereum has recently created a new standard called the ERC721 token for tracking unique digital assets. One of the biggest use cases currently for such tokens is digital collectibles, as the infrastructure allows for people to prove ownership of scarce digital goods. Many games are currently being built using this technology, such as the overnight hit CryptoKitties, a game where you can collect and breed digital cats.
• عدم الإعتراف بها من قبل الجهات المُختصة: إستناداً إلى قول الإمام ابن تيمية: ’’الدراهم والدنانير لا تقصد لنفسها بل هي وسيلة إلى التعامل بها، ولهذا كانت أثمانا بخلاف سائر الأموال، فإن – هذه الاموال – المقصود الإنتفاع بها نفسها”. وفي وقتنا الحالى لا تعتمد تداول وإستثمار العُملات إلا بموجب إعتراف وموافقة من قبل الجهات المُختصة وعلى رأسها البنوك المركزية. وبحسب ما قُيل من قبل البنوك المركزية إنه لم يتم الإعتراف بعد بعُملات البيتكوين الإفتراضية كعٌملات صالحة للتداول والإستثمار. وطبقاً لذلك تُحرم عمليات التداول والإستثمار للبيتكوين.
Ether is a token whose blockchain is generated by the Ethereum platform. Ether can be transferred between accounts and used to compensate participant mining nodes for computations performed.[3] Ethereum provides a decentralized virtual machine, the Ethereum Virtual Machine (EVM), which can execute scripts using an international network of public nodes.[4] The virtual machine's instruction set, in contrast to others like Bitcoin Script, is thought to be Turing-complete. "Gas", an internal transaction pricing mechanism, is used to mitigate spam and allocate resources on the network.[4]
Ethereum's smart contracts are based on different computer languages, which developers use to program their own functionalities. Smart contracts are high-level programming abstractions that are compiled down to EVM bytecode and deployed to the Ethereum blockchain for execution. They can be written in Solidity (a language library with similarities to C and JavaScript), Serpent (similar to Python, but deprecated), LLL (a low-level Lisp-like language), and Mutan (Go-based, but deprecated). There is also a research-oriented language under development called Vyper (a strongly-typed Python-derived decidable language). 

The first wallet program, simply named Bitcoin, and sometimes referred to as the Satoshi client, was released in 2009 by Satoshi Nakamoto as open-source software.[11] In version 0.5 the client moved from the wxWidgets user interface toolkit to Qt, and the whole bundle was referred to as Bitcoin-Qt.[107] After the release of version 0.9, the software bundle was renamed Bitcoin Core to distinguish itself from the underlying network.[108][109]

Network nodes can validate transactions, add them to their copy of the ledger, and then broadcast these ledger additions to other nodes. To achieve independent verification of the chain of ownership each network node stores its own copy of the blockchain.[76] About every 10 minutes, a new group of accepted transactions, called a block, is created, added to the blockchain, and quickly published to all nodes, without requiring central oversight. This allows bitcoin software to determine when a particular bitcoin was spent, which is needed to prevent double-spending. A conventional ledger records the transfers of actual bills or promissory notes that exist apart from it, but the blockchain is the only place that bitcoins can be said to exist in the form of unspent outputs of transactions.[7]:ch. 5
On 3 January 2009, the bitcoin network was created when Nakamoto mined the first block of the chain, known as the genesis block.[21][22] Embedded in the coinbase of this block was the text "The Times 03/Jan/2009 Chancellor on brink of second bailout for banks".[11] This note references a headline published by The Times and has been interpreted as both a timestamp and a comment on the instability caused by fractional-reserve banking.[23]:18

As the industry continues to investigate blockchain platforms, it’s apparent that Ethereum is becoming a de facto leader. For example, a few days ago JPMorgan publicly open-sourced its Quorum platform, architected and developed around the Go Ethereum client by Jeff Wilcke and his team. Several other major banks are using Ethereum, and Microsoft is anchoring its Bletchley platform on it as the foundational blockchain element. Industry, both publicly and confidentially, continues to contribute to Ethereum and work with us and others to help our promising, toddler-age codebase reach maturity. Stay tuned for news on this front.


In 2016 a decentralized autonomous organization called The DAO, a set of smart contracts developed on the platform, raised a record US$150 million in a crowdsale to fund the project.[25] The DAO was exploited in June when US$50 million in ether were taken by an unknown hacker.[26][27] The event sparked a debate in the crypto-community about whether Ethereum should perform a contentious "hard fork" to reappropriate the affected funds.[28] As a result of the dispute, the network split in two. Ethereum (the subject of this article) continued on the forked blockchain, while Ethereum Classic continued on the original blockchain.[29] The hard fork created a rivalry between the two networks.
بروتوكول اكتشاف الجيران (NDP) بروتوكول حل العناوين (ARP) بروتوكولات نفقيّة (بروتوكول الأنفاق في الطبقة الثانية) بروتوكول الربط بين نقطتين (PPP) بروتوكول الشجرة المُتفرعة (STP) الواجهة البينية للبيانات الموزعة بالألياف (FDDI) تبديل الأطر الإيثرنت (IEEE 802.3). الشبكات المحليّة اللاسلكيّة (IEEE 802.11) الشبكات الشخصية اللاسلكية (IEEE 802.15) البلوتوث (IEEE 802.15.1) الشبكات الشخصية اللاسلكية منخفضة المعدل (IEEE 802.15.4) مزيد ..
• وسائل الحصول على عُملات البيتكوين: بُناء عى حكم الفتوى رقم: 231460 لدار الإفتاء، أكدت إنه إذا كان الحصول على هذه العُملات الإفتراضية مثل عمليات التعدين والتنقيب يتم بشكل سليم بعيد عن التلاعب والغش والسرقة والنصب، فيجوز إدراجها تحت بنود العُملات المُحللة. ولكن بشرط التقابض وهو ما يحدث مع تداول عُملات البيتكوين، كما أن الإستثمارات الناتجة من أرباح عمليات بيع وشراء البيتكوين من ضمن الأسباب التى تثبت تحليل عملات البيتكوين، حيث إنه إذا كُنت شخص سليم النية ستقوم بإستثمار أرباحك بما يُرضى الله ولأن الله أعلم بالنوايا ستُحتسب في ميزان حسناتك.

• الطبيعة الإنكماشية لعُملات البيتكوين: كما ذُكر أيضاُ عبر موقع الفتاوى  أن عُملات البيتكوين مثلها مثل أى عُملة آخرى لها طبيعة إنكماشية. نقصد بالطبيعة الإنكماشية هو التذبذب في الأسعار ما بين إرتفاع للقيمة السعرية وإنخفاض للقيمة السعرية بُناء على الحالة الإقتصادية العالمية ومدى إقبال الجمهور المُتعامل معها على شراء أو بيع العُملة. وهذا يدل على مصداقية العُملة وخضوعها لتغيرات السوق والعُملاء مثلها مثل سوق الذهب بالضبط.
Though transaction fees are optional, miners can choose which transactions to process and prioritize those that pay higher fees.[77] Miners may choose transactions based on the fee paid relative to their storage size, not the absolute amount of money paid as a fee. These fees are generally measured in satoshis per byte (sat/b). The size of transactions is dependent on the number of inputs used to create the transaction, and the number of outputs.[7]:ch. 8
In Ethereum all smart contracts are stored publicly on every node of the blockchain, which has costs.[57] Being a blockchain means it is secure by design and is an example of a distributed computing system with high Byzantine fault tolerance. The downside is that performance issues arise in that every node is calculating all the smart contracts in real time, resulting in lower speeds.[57] As of January 2016, the Ethereum protocol could process about 25 transactions per second.[57] In comparison, the Visa payment platform processes 45,000 payments per second leading some to question the scalability of Ethereum.[58] On 19 December 2016, Ethereum exceeded one million transactions in a single day for the first time.[59]
Until relatively recently, building blockchain applications has required a complex background in coding, cryptography, mathematics as well as significant resources. But times have changed. Previously unimagined applications, from electronic voting & digitally recorded property assets to regulatory compliance & trading are now actively being developed and deployed faster than ever before. By providing developers with the tools to build decentralized applications, Ethereum is making all of this possible.
The rapid price increase of Ethereum has not only attracted investors but developers too. Ethereum has tens of thousands of developers in its open source community, each contributing to the many layers of the “Ethereum stack”. This includes code contributions to the core Ethereum clients, second layer scaling tech and the “decentralized applications” (dApps) that are built on top of the platform. The appeal of Ethereum to developers is unique in that it was the first platform to allow anyone in the world to write and deploy code that would run without the risk of censorship. The community of developers which have formed around these core principles have led to the creation of technologies that could not have existed without the inception of Ethereum, many of which were never predicted. Some of the major use-cases of Ethereum so far have been:
×