As a cryptocurrency attracts more interest, mining becomes harder and the amount of coins received as a reward decreases. For example, when Bitcoin was first created, the reward for successful mining was 50 BTC. Now, the reward stands at 12.5 Bitcoins. This happened because the Bitcoin network is designed so that there can only be a total of 21 mln coins in circulation.
2) Pseudonymous: Neither transactions nor accounts are connected to real-world identities. You receive Bitcoins on so-called addresses, which are randomly seeming chains of around 30 characters. While it is usually possible to analyze the transaction flow, it is not necessarily possible to connect the real world identity of users with those addresses.
Bitcoin is pseudonymous rather than anonymous in that the cryptocurrency within a wallet is not tied to people, but rather to one or more specific keys (or "addresses").[41] Thereby, bitcoin owners are not identifiable, but all transactions are publicly available in the blockchain. Still, cryptocurrency exchanges are often required by law to collect the personal information of their users.[citation needed]
The proof-of-stake is a method of securing a cryptocurrency network and achieving distributed consensus through requesting users to show ownership of a certain amount of currency. It is different from proof-of-work systems that run difficult hashing algorithms to validate electronic transactions. The scheme is largely dependent on the coin, and there's currently no standard form of it. Some cryptocurrencies use a combined proof-of-work/proof-of-stake scheme.[16]
In 1983, the American cryptographer David Chaum conceived an anonymous cryptographic electronic money called ecash.[7][8] Later, in 1995, he implemented it through Digicash,[9] an early form of cryptographic electronic payments which required user software in order to withdraw notes from a bank and designate specific encrypted keys before it can be sent to a recipient. This allowed the digital currency to be untraceable by the issuing bank, the government, or any third party.
1) Controlled supply: Most cryptocurrencies limit the supply of the tokens. In Bitcoin, the supply decreases in time and will reach its final number sometime around the year 2140. All cryptocurrencies control the supply of the token by a schedule written in the code. This means the monetary supply of a cryptocurrency in every given moment in the future can roughly be calculated today. There is no surprise.

1. The blockchain is a ledger that keeps track of how much ‘stuff’ (ie BTC, ETH,…create your own currency if you wish) you have. Its the history of transactions. ‘Ethereum’ provides a platform for building contracts…if a contract’s conditions are met, then a transaction (whose rules and automation are agreed ahead of time) automatically occurs and the result of that transaction becomes a part of the ledger. Anyone will be able to see that an address (sellers’ public key) has given ‘stuff’ to another address (purchasers’ public key).

In the blockchain, bitcoins are registered to bitcoin addresses. Creating a bitcoin address requires nothing more than picking a random valid private key and computing the corresponding bitcoin address. This computation can be done in a split second. But the reverse, computing the private key of a given bitcoin address, is mathematically unfeasible. Users can tell others or make public a bitcoin address without compromising its corresponding private key. Moreover, the number of valid private keys is so vast that it is extremely unlikely someone will compute a key-pair that is already in use and has funds. The vast number of valid private keys makes it unfeasible that brute force could be used to compromise a private key. To be able to spend their bitcoins, the owner must know the corresponding private key and digitally sign the transaction. The network verifies the signature using the public key; the private key is never revealed.[7]:ch. 5
Full clients verify transactions directly by downloading a full copy of the blockchain (over 150 GB As of January 2018).[100] They are the most secure and reliable way of using the network, as trust in external parties is not required. Full clients check the validity of mined blocks, preventing them from transacting on a chain that breaks or alters network rules.[7]:ch. 1 Because of its size and complexity, downloading and verifying the entire blockchain is not suitable for all computing devices.
Ethereum-based customized software and networks, independent from the public Ethereum chain, are being tested by enterprise software companies.[47] Interested parties include Microsoft, IBM, JPMorgan Chase,[33][48] Deloitte,[49] R3,[50] Innovate UK (cross-border payments prototype).[51] Barclays, UBS and Credit Suisse are experimenting with Ethereum.
On 1 August 2017, a hard fork of bitcoin was created, known as Bitcoin Cash.[116] Bitcoin Cash has a larger block size limit and had an identical blockchain at the time of fork. On 24 October 2017 another hard fork, Bitcoin Gold, was created. Bitcoin Gold changes the proof-of-work algorithm used in mining, as the developers felt that mining had become too specialized.[117]
These decentralized applications (or “dapps”) gain the benefits of cryptocurrency and blockchain technology. They can be trustworthy, meaning that once they are “uploaded” to Ethereum, they will always run as programmed. They can control digital assets in order to create new kinds of financial applications. They can be decentralized, meaning that no single entity or person controls them.
A lot of concerns have been raised regarding cryptocurrencies’ decentralized nature and their ability to be used almost completely anonymously. The authorities all over the world are worried about the cryptocurrencies’ appeal to the traders of illegal goods and services. Moreover, they are worried about their use in money laundering and tax evasion schemes.
Cryptocurrencies have been compared to Ponzi schemes, pyramid schemes[76] and economic bubbles,[77] such as housing market bubbles.[78] Howard Marks of Oaktree Capital Management stated in 2017 that digital currencies were "nothing but an unfounded fad (or perhaps even a pyramid scheme), based on a willingness to ascribe value to something that has little or none beyond what people will pay for it", and compared them to the tulip mania (1637), South Sea Bubble (1720), and dot-com bubble (1999).[79] The New Yorker has explained the debate based on interviews with blockchain founders in an article about the “argument over whether Bitcoin, Ethereum, and the blockchain are transforming the world”.[80]
One of the most important problems that any payment network has to solve is double-spending. It is a fraudulent technique of spending the same amount twice. The traditional solution was a trusted third party - a central server - that kept records of the balances and transactions. However, this method always entailed an authority basically in control of your funds and with all your personal details on hand.
To lower the costs, bitcoin miners have set up in places like Iceland where geothermal energy is cheap and cooling Arctic air is free.[213] Bitcoin miners are known to use hydroelectric power in Tibet, Quebec, Washington (state), and Austria to reduce electricity costs.[212][214] Miners are attracted to suppliers such as Hydro Quebec that have energy surpluses.[215] According to a University of Cambridge study, much of bitcoin mining is done in China, where electricity is subsidized by the government.[216][217]

This flexibility makes Ethereum the perfect instrument for blockchain -application. But it comes at a cost. After the Hack of the DAO – an Ethereum based smart contract – the developers decided to do a hard fork without consensus, which resulted in the emerge of Ethereum Classic. Besides this, there are several clones of Ethereum, and Ethereum itself is a host of several Tokens like DigixDAO and Augur. This makes Ethereum more a family of cryptocurrencies than a single currency.
Once you bought your cryptocurrency, you need a way to store it. All major exchanges offer wallet services. But, while it might seem convenient, it’s best if you store your assets in an offline wallet on your hard drive, or even invest in a hardware wallet. This is the most secure way of storing your coins and it gives you full control over your assets.
Bloomberg reported that the largest 17 crypto merchant-processing services handled $69 million in June 2018, down from $411 million in September 2017. Bitcoin is "not actually usable" for retail transactions because of high costs and the inability to process chargebacks, according to Nicholas Weaver, a researcher quoted by Bloomberg. High price volatility and transaction fees make paying for small retail purchases with bitcoin impractical, according to economist Kim Grauer. However, bitcoin continues to be used for large-item purchases on sites such as Overstock.com, and for cross-border payments to freelancers and other vendors.[149]
Litecoin was one of the first cryptocurrencies after Bitcoin and tagged as the silver to the digital gold bitcoin. Faster than bitcoin, with a larger amount of token and a new mining algorithm, Litecoin was a real innovation, perfectly tailored to be the smaller brother of bitcoin. “It facilitated the emerge of several other cryptocurrencies which used its codebase but made it, even more, lighter“. Examples are Dogecoin or Feathercoin.
1) Controlled supply: Most cryptocurrencies limit the supply of the tokens. In Bitcoin, the supply decreases in time and will reach its final number sometime around the year 2140. All cryptocurrencies control the supply of the token by a schedule written in the code. This means the monetary supply of a cryptocurrency in every given moment in the future can roughly be calculated today. There is no surprise.
Third-party internet services called online wallets offer similar functionality but may be easier to use. In this case, credentials to access funds are stored with the online wallet provider rather than on the user's hardware.[102] As a result, the user must have complete trust in the online wallet provider. A malicious provider or a breach in server security may cause entrusted bitcoins to be stolen. An example of such a security breach occurred with Mt. Gox in 2011.[103]
Though transaction fees are optional, miners can choose which transactions to process and prioritize those that pay higher fees.[81] Miners may choose transactions based on the fee paid relative to their storage size, not the absolute amount of money paid as a fee. These fees are generally measured in satoshis per byte (sat/b). The size of transactions is dependent on the number of inputs used to create the transaction, and the number of outputs.[7]:ch. 8
×