Full clients verify transactions directly by downloading a full copy of the blockchain (over 150 GB As of January 2018).[100] They are the most secure and reliable way of using the network, as trust in external parties is not required. Full clients check the validity of mined blocks, preventing them from transacting on a chain that breaks or alters network rules.[7]:ch. 1 Because of its size and complexity, downloading and verifying the entire blockchain is not suitable for all computing devices.
1. The blockchain is a ledger that keeps track of how much ‘stuff’ (ie BTC, ETH,…create your own currency if you wish) you have. Its the history of transactions. ‘Ethereum’ provides a platform for building contracts…if a contract’s conditions are met, then a transaction (whose rules and automation are agreed ahead of time) automatically occurs and the result of that transaction becomes a part of the ledger. Anyone will be able to see that an address (sellers’ public key) has given ‘stuff’ to another address (purchasers’ public key).
An initial coin offering (ICO) is a controversial means of raising funds for a new cryptocurrency venture. An ICO may be used by startups with the intention of avoiding regulation. However, securities regulators in many jurisdictions, including in the U.S., and Canada have indicated that if a coin or token is an "investment contract" (e.g., under the Howey test, i.e., an investment of money with a reasonable expectation of profit based significantly on the entrepreneurial or managerial efforts of others), it is a security and is subject to securities regulation. In an ICO campaign, a percentage of the cryptocurrency (usually in the form of "tokens") is sold to early backers of the project in exchange for legal tender or other cryptocurrencies, often bitcoin or ether.[47][48][49]
To understand the revolutionary impact of cryptocurrencies you need to consider both properties. Bitcoin as a permissionless, irreversible, and pseudonymous means of payment is an attack on the control of banks and governments over the monetary transactions of their citizens. You can‘t hinder someone to use Bitcoin, you can‘t prohibit someone to accept a payment, you can‘t undo a transaction.
You don‘t need to understand the details about SHA 256. It‘s only important you know that it can be the basis of a cryptologic puzzle the miners compete to solve. After finding a solution, a miner can build a block and add it to the blockchain. As an incentive, he has the right to add a so-called coinbase transaction that gives him a specific number of Bitcoins. This is the only way to create valid Bitcoins.
Vitalik Buterin picked the name Ethereum after browsing Wikipedia articles about elements and science fiction, when he found the name, noting, "I immediately realized that I liked it better than all of the other alternatives that I had seen; I suppose it was the fact that sounded nice and it had the word 'ether', referring to the hypothetical invisible medium that permeates the universe and allows light to travel."[9]
While another less aggressive soft fork solution was put forth, the Ethereum community and its founders were placed in a perilous position. If they didn’t retrieve the stolen investor money, confidence in Ethereum could be lost. On the other hand, recovering investor money required actions that went against the core ideas of decentralization and set a dangerous precedent.

Blockchain analysts estimate that Nakamoto had mined about one million bitcoins[32] before disappearing in 2010, when he handed the network alert key and control of the code repository over to Gavin Andresen. Andresen later became lead developer at the Bitcoin Foundation.[33][34] Andresen then sought to decentralize control. This left opportunity for controversy to develop over the future development path of bitcoin, in contrast to the perceived authority of Nakamoto's contributions.[35][34]