Ethereum was officially with an unusually long list of founders. Anthony Di Iorio wrote "Ethereum was founded by Vitalik Buterin, Myself, Charles Hoskinson, Mihai Alisie, & Amir Chetrit (the initial 5) in December 2013. Joseph Lubin, Gavin Wood, & Jeffrey Wilke were added in early 2014 as founders." Formal development of the Ethereum software project began in early 2014 through a Swiss company, Ethereum Switzerland GmbH (EthSuisse).[13][14] The basic idea of putting executable smart contracts in the blockchain needed to be specified before the software could be implemented; this work was done by Gavin Wood, then chief technology officer, in the Ethereum Yellow Paper that specified the Ethereum Virtual Machine.[15] Subsequently, a Swiss non-profit foundation, the Ethereum Foundation (Stiftung Ethereum), was created as well. Development was funded by an online public crowdsale during July–August 2014, with the participants buying the Ethereum value token (ether) with another digital currency, bitcoin.

Properties of cryptocurrencies gave them popularity in applications such as a safe haven in banking crises and means of payment, which also led to the cryptocurrency use in controversial settings in the form of online black markets, such as Silk Road.[66] The original Silk Road was shut down in October 2013 and there have been two more versions in use since then. In the year following the initial shutdown of Silk Road, the number of prominent dark markets increased from four to twelve, while the amount of drug listings increased from 18,000 to 32,000.[66]
The proof-of-stake is a method of securing a cryptocurrency network and achieving distributed consensus through requesting users to show ownership of a certain amount of currency. It is different from proof-of-work systems that run difficult hashing algorithms to validate electronic transactions. The scheme is largely dependent on the coin, and there's currently no standard form of it. Some cryptocurrencies use a combined proof-of-work/proof-of-stake scheme.[16]

Monero is the most prominent example of the CryptoNight algorithm. This algorithm was invented to add the privacy features Bitcoin is missing. If you use Bitcoin, every transaction is documented in the blockchain and the trail of transactions can be followed. With the introduction of a concept called ring-signatures, the CryptoNight algorithm was able to cut through that trail.

Two members of the Silk Road Task Force—a multi-agency federal task force that carried out the U.S. investigation of Silk Road—seized bitcoins for their own use in the course of the investigation.[68] DEA agent Carl Mark Force IV, who attempted to extort Silk Road founder Ross Ulbricht ("Dread Pirate Roberts"), pleaded guilty to money laundering, obstruction of justice, and extortion under color of official right, and was sentenced to 6.5 years in federal prison.[68] U.S. Secret Service agent Shaun Bridges pleaded guilty to crimes relating to his diversion of $800,000 worth of bitcoins to his personal account during the investigation, and also separately pleaded guilty to money laundering in connection with another cryptocurrency theft; he was sentenced to nearly eight years in federal prison.[69]
While cryptocurrencies are digital currencies that are managed through advanced encryption techniques, many governments have taken a cautious approach toward them, fearing their lack of central control and the effects they could have on financial security.[81] Regulators in several countries have warned against cryptocurrency and some have taken concrete regulatory measures to dissuade users.[82] Additionally, many banks do not offer services for cryptocurrencies and can refuse to offer services to virtual-currency companies.[83] Gareth Murphy, a senior central banking officer has stated "widespread use [of cryptocurrency] would also make it more difficult for statistical agencies to gather data on economic activity, which are used by governments to steer the economy". He cautioned that virtual currencies pose a new challenge to central banks' control over the important functions of monetary and exchange rate policy.[84] While traditional financial products have strong consumer protections in place, there is no intermediary with the power to limit consumer losses if bitcoins are lost or stolen.[85] One of the features cryptocurrency lacks in comparison to credit cards, for example, is consumer protection against fraud, such as chargebacks.

In May 2018, Bitcoin Gold (and two other cryptocurrencies) were hit by a successful 51% hashing attack by an unknown actor, in which exchanges lost estimated $18m.[citation needed] In June 2018, Korean exchange Coinrail was hacked, losing US$37 million worth of altcoin. Fear surrounding the hack was blamed for a $42 billion cryptocurrency market selloff.[72] On 9 July 2018 the exchange Bancor had $23.5 million in cryptocurrency stolen.[73]

But while cryptocurrencies are more used for payment, its use as a means of speculation and a store of value dwarfs the payment aspects. Cryptocurrencies gave birth to an incredibly dynamic, fast-growing market for investors and speculators. Exchanges like Okcoin, Poloniex or shapeshift enables the trade of hundreds of cryptocurrencies. Their daily trade volume exceeds that of major European stock exchanges.
Once you bought your cryptocurrency, you need a way to store it. All major exchanges offer wallet services. But, while it might seem convenient, it’s best if you store your assets in an offline wallet on your hard drive, or even invest in a hardware wallet. This is the most secure way of storing your coins and it gives you full control over your assets.
^ Chan, Edwin. "China Plans to Ban Cryptocurrency Mining in Renewed Clampdown". Retrieved 10 April 2019. While China was once home to about 70 percent of Bitcoin mining and 90 percent of trades, authorities have waged a nearly two-year campaign to shrink the crypto industry amid concerns over speculative bubbles, fraud and wasteful energy consumption.
Ethereum has recently created a new standard called the ERC721 token for tracking unique digital assets. One of the biggest use cases currently for such tokens is digital collectibles, as the infrastructure allows for people to prove ownership of scarce digital goods. Many games are currently being built using this technology, such as the overnight hit CryptoKitties, a game where you can collect and breed digital cats.
On 21 November 2017, the Tether cryptocurrency announced they were hacked, losing $31 million in USDT from their primary wallet.[71] The company has 'tagged' the stolen currency, hoping to 'lock' them in the hacker's wallet (making them unspendable). Tether indicates that it is building a new core for its primary wallet in response to the attack in order to prevent the stolen coins from being used.
Ethereum is also being used as a platform to launch other cryptocurrencies. Because of the ERC20 token standard defined by the Ethereum Foundation, other developers can issue their own versions of this token and raise funds with an initial coin offering (ICO). In this fundraising strategy, the issuers of the token set an amount they want to raise, offer it in a crowdsale, and receive Ether in exchange. Billions of dollars have been raised by ICOs on the Ethereum platform in the last two years, and one of the most valuable cryptocurrencies in the world, EOS, is an ERC20 token.

You don‘t need to understand the details about SHA 256. It‘s only important you know that it can be the basis of a cryptologic puzzle the miners compete to solve. After finding a solution, a miner can build a block and add it to the blockchain. As an incentive, he has the right to add a so-called coinbase transaction that gives him a specific number of Bitcoins. This is the only way to create valid Bitcoins.

#BitBlockBoom was probably the most surreal event to occur in crypto land since the Bitconnect annual ceremony of January 2018. The event, which is a self-described conference for Bitcoin Maximalists, saw a presentation which gave a step-by-step guide to trolling and arguing with supporters of other cryptocurrencies. One slide, titled “The path to victory” closed with the statement “bully people that don’t agree with us”; and another titled “Relentless propaganda again” led with “Nocoiners must be crushed” (here’s a full transcript of the ramblings).
The Bank for International Settlements summarized several criticisms of bitcoin in Chapter V of their 2018 annual report. The criticisms include the lack of stability in bitcoin's price, the high energy consumption, high and variable transactions costs, the poor security and fraud at cryptocurrency exchanges, vulnerability to debasement (from forking), and the influence of miners.[198][199][200]
Physical wallets can also take the form of metal token coins[107] with a private key accessible under a security hologram in a recess struck on the reverse side.[108]:38 The security hologram self-destructs when removed from the token, showing that the private key has been accessed.[109] Originally, these tokens were struck in brass and other base metals, but later used precious metals as bitcoin grew in value and popularity.[108]:80 Coins with stored face value as high as ₿1000 have been struck in gold.[108]:102–104 The British Museum's coin collection includes four specimens from the earliest series[108]:83 of funded bitcoin tokens; one is currently on display in the museum's money gallery.[110] In 2013, a Utahn manufacturer of these tokens was ordered by the Financial Crimes Enforcement Network (FinCEN) to register as a money services business before producing any more funded bitcoin tokens.[107][108]:80
Within a cryptocurrency network, only miners can confirm transactions by solving a cryptographic puzzle. They take transactions, mark them as legitimate and spread them across the network. Afterwards, every node of the network adds it to its database. Once the transaction is confirmed it becomes unforgeable and irreversible and a miner receives a reward, plus the transaction fees.

When it comes to other, less popular cryptocurrencies, the buying options aren’t as diverse. However, there are still numerous exchanges where you can acquire various crypto-coins for flat currencies or Bitcoins. Face-to-face trading is also a popular way of acquiring coins. Buying options depend on particular cryptocurrencies, their popularity as well as your location.

Several news outlets have asserted that the popularity of bitcoins hinges on the ability to use them to purchase illegal goods.[141][230] Nobel-prize winning economist Joseph Stiglitz says that bitcoin's anonymity encourages money laundering and other crimes, "If you open up a hole like bitcoin, then all the nefarious activity will go through that hole, and no government can allow that." He's also said that if "you regulate it so you couldn't engage in money laundering and all these other [crimes], there will be no demand for Bitcoin. By regulating the abuses, you are going to regulate it out of existence. It exists because of the abuses."[231][232]
In 1998, Wei Dai published a description of "b-money", characterized as an anonymous, distributed electronic cash system.[12] Shortly thereafter, Nick Szabo described bit gold.[13] Like bitcoin and other cryptocurrencies that would follow it, bit gold (not to be confused with the later gold-based exchange, BitGold) was described as an electronic currency system which required users to complete a proof of work function with solutions being cryptographically put together and published. A currency system based on a reusable proof of work was later created by Hal Finney who followed the work of Dai and Szabo.[citation needed]

Ethereum’s core innovation, the Ethereum Virtual Machine (EVM) is a Turing complete software that runs on the Ethereum network. It enables anyone to run any program, regardless of the programming language given enough time and memory. The Ethereum Virtual Machine makes the process of creating blockchain applications much easier and efficient than ever before. Instead of having to build an entirely original blockchain for each new application, Ethereum enables the development of potentially thousands of different applications all on one platform.
Ethereum-based customized software and networks, independent from the public Ethereum chain, are being tested by enterprise software companies.[47] Interested parties include Microsoft, IBM, JPMorgan Chase,[33][48] Deloitte,[49] R3,[50] Innovate UK (cross-border payments prototype).[51] Barclays, UBS and Credit Suisse are experimenting with Ethereum.
There is ongoing research on how to use formal verification to express and prove non-trivial properties. A Microsoft Research report noted that writing solid smart contracts can be extremely difficult in practice, using The DAO hack to illustrate this problem. The report discussed tools that Microsoft had developed for verifying contracts, and noted that a large-scale analysis of published contracts is likely to uncover widespread vulnerabilities. The report also stated that it is possible to verify the equivalence of a Solidity program and the EVM code.[41]
On 21 November 2017, the Tether cryptocurrency announced they were hacked, losing $31 million in USDT from their primary wallet.[71] The company has 'tagged' the stolen currency, hoping to 'lock' them in the hacker's wallet (making them unspendable). Tether indicates that it is building a new core for its primary wallet in response to the attack in order to prevent the stolen coins from being used.
Bitcoin has been criticized for its use in illegal transactions, its high electricity consumption, price volatility, and thefts from exchanges. Some noted economists, including several Nobel laureates, have characterized it as a speculative bubble. Bitcoin has also been used as an investment, although several regulatory agencies have issued investor alerts about bitcoin.[19][20]