• Ethereum’s chart is displaying a textbook case of Gann’s cycles of an inner year. • These cycles can help determine trend direction months ahead of time. The Cycles of the Inner Year Some of the most important lessons that Gann taught were related to time. Gann said that time was the factor that dictated the direction of a trend. Gann focused heavily on time...
While another less aggressive soft fork solution was put forth, the Ethereum community and its founders were placed in a perilous position. If they didn’t retrieve the stolen investor money, confidence in Ethereum could be lost. On the other hand, recovering investor money required actions that went against the core ideas of decentralization and set a dangerous precedent.

To be accepted by the rest of the network, a new block must contain a proof-of-work (PoW).[79] The system used is based on Adam Back's 1997 anti-spam scheme, Hashcash.[90][failed verification][4] The PoW requires miners to find a number called a nonce, such that when the block content is hashed along with the nonce, the result is numerically smaller than the network's difficulty target.[7]:ch. 8 This proof is easy for any node in the network to verify, but extremely time-consuming to generate, as for a secure cryptographic hash, miners must try many different nonce values (usually the sequence of tested values is the ascending natural numbers: 0, 1, 2, 3, ...[7]:ch. 8) before meeting the difficulty target.
J. P. Morgan Chase is developing JPM Coin on a permissioned-variant of Ethereum blockchain dubbed "Quorum".[52] It's designed to toe the line between private and public in the realm of shuffling derivatives and payments. The idea is to satisfy regulators who need seamless access to financial goings-on, while protecting the privacy of parties that don't wish to reveal their identities nor the details of their transactions to the general public.[53]
“In 2 years from now, I believe cryptocurrencies will be gaining legitimacy as a protocol for business transactions, micropayments, and overtaking Western Union as the preferred remittance tool. Regarding business transactions – you’ll see two paths: There will be financial businesses which use it for it’s no fee, nearly-instant ability to move any amount of money around, and there will be those that utilize it for its blockchain technology. Blockchain technology provides the largest benefit with trustless auditing, single source of truth, smart contracts, and color coins.”
In the end, the majority of the Ethereum community voted to perform a hard fork, and retrieve The DAO investors money. But not everyone agreed with this course of action. This resulted in a split where two parallel blockchains now exist. For those members who strongly disagree with any changes to the blockchain even when hacking occurs there is Ethereum classic. For the majority who agreed to rewrite a small part of the blockchain and return the stolen money to their owners, there is Ethereum.  
Ether is a token whose blockchain is generated by the Ethereum platform. Ether can be transferred between accounts and used to compensate participant mining nodes for computations performed.[3] Ethereum provides a decentralized virtual machine, the Ethereum Virtual Machine (EVM), which can execute scripts using an international network of public nodes.[4] The virtual machine's instruction set, in contrast to others like Bitcoin Script, is thought to be Turing-complete. "Gas", an internal transaction pricing mechanism, is used to mitigate spam and allocate resources on the network.[4]
NEM — Unlike most other cryptocurrencies that utilize a Proof of Work algorithm, it uses Proof of Importance, which requires users to already possess certain amounts of coins in order to be able to get new ones. It encourages users to spend their funds and tracks the transactions to determine how important a particular user is to the overall NEM network.
Cryptocurrencies are systems that allow for the secure payments of online transactions that are denominated in terms of a virtual "token," representing ledger entries internal to the system itself. "Crypto" refers to the fact that various encryption algorithms and cryptographic techniques, such as elliptical curve encryption, public-private key pairs, and hashing functions, are employed.
Cryptocurrencies hold the promise of making it easier to transfer funds directly between two parties in a transaction, without the need for a trusted third party such as a bank or credit card company; these transfers are facilitated through the use of public keys and private keys for security purposes. In modern cryptocurrency systems, a user's "wallet," or account address, has the public key, and the private key is used to sign transactions. Fund transfers are done with minimal processing fees, allowing users to avoid the steep fees charged by most banks and financial institutions for wire transfers.
There are many ways you can plug into the Ethereum network, one of the easiest ways is to use its native Mist browser. Mist provides a user-friendly interface & digital wallet for users to trade & store Ether as well as write, manage, deploy and use smart contracts. Like web browsers give access and help people navigate the internet, Mist provides a portal into the world of decentralized blockchain applications.
Third-party internet services called online wallets offer similar functionality but may be easier to use. In this case, credentials to access funds are stored with the online wallet provider rather than on the user's hardware.[102] As a result, the user must have complete trust in the online wallet provider. A malicious provider or a breach in server security may cause entrusted bitcoins to be stolen. An example of such a security breach occurred with Mt. Gox in 2011.[103]
Because of bitcoin's decentralized nature and its trading on online exchanges located in many countries, regulation of bitcoin has been difficult. However, the use of bitcoin can be criminalized, and shutting down exchanges and the peer-to-peer economy in a given country would constitute a de facto ban.[176] The legal status of bitcoin varies substantially from country to country and is still undefined or changing in many of them. Regulations and bans that apply to bitcoin probably extend to similar cryptocurrency systems.[177]

Cryptocurrencies hold the promise of making it easier to transfer funds directly between two parties in a transaction, without the need for a trusted third party such as a bank or credit card company; these transfers are facilitated through the use of public keys and private keys for security purposes. In modern cryptocurrency systems, a user's "wallet," or account address, has the public key, and the private key is used to sign transactions. Fund transfers are done with minimal processing fees, allowing users to avoid the steep fees charged by most banks and financial institutions for wire transfers.


Bitcoin is a digital asset designed to work in peer-to-peer transactions as a currency.[4][141] Bitcoins have three qualities useful in a currency, according to The Economist in January 2015: they are "hard to earn, limited in supply and easy to verify."[142] Per some researchers, as of 2015, bitcoin functions more as a payment system than as a currency.[36]
In the blockchain, bitcoins are registered to bitcoin addresses. Creating a bitcoin address requires nothing more than picking a random valid private key and computing the corresponding bitcoin address. This computation can be done in a split second. But the reverse, computing the private key of a given bitcoin address, is mathematically unfeasible. Users can tell others or make public a bitcoin address without compromising its corresponding private key. Moreover, the number of valid private keys is so vast that it is extremely unlikely someone will compute a key-pair that is already in use and has funds. The vast number of valid private keys makes it unfeasible that brute force could be used to compromise a private key. To be able to spend their bitcoins, the owner must know the corresponding private key and digitally sign the transaction. The network verifies the signature using the public key; the private key is never revealed.[7]:ch. 5
×