The 2-Minute Rule for Travel planning
If an attacker tries to tamper by using a block’s data, the subsequent blocks will crack since the hash values have improved. The nodes can quickly detect such a situation because the miners or validators nodes will invalidate the many variations.
Defending the data shared over the bl