Blockchain Technology

Blockchain technology deals with distributed public ledgers that have data and ensure that transactions can never be altered. 

The most popular examples of blockchain usage are Bitcoin and other cryptocurrencies, however, blockchain technology is finding a diverse range of purposes. Uses such as data storage, financial transactions, and many more have been investigated as potential benefits of blockchain technology. 

A blockchain is a tamper-evident, shared a digital ledger that records transactions in a public or private peer-to-peer network. Distributed to all member nodes in the network, the ledger permanently records, in a sequential chain of cryptographic hash-linked blocks, the history of asset exchanges that take place between the peers in the network.

All the confirmed and validated transaction blocks are linked and chained from the beginning of the chain to the most current block, hence the name blockchain. The blockchain thus acts as a single source of truth, and members in a blockchain network can view only those transactions that are relevant to them.

Instead of relying on a third party, such as a financial institution, to mediate transactions, member nodes in a blockchain network use a consensus protocol to agree on ledger content, and cryptographic hashes and digital signatures to ensure the integrity of transactions.

Consensus ensures that the shared ledgers are exact copies, and lowers the risk of fraudulent transactions because tampering would have to occur across many places at exactly the same time. Cryptographic hashes, such as the SHA256 computational algorithm, ensure that any alteration to transaction input — even the most minuscule change — results in a different hash value being computed, which indicates potentially compromised transaction input. Digital signatures ensure that transactions originated from senders (signed with private keys) and not imposters.

The decentralized peer-to-peer blockchain network prevents any single participant or group of participants from controlling the underlying infrastructure or undermining the entire system. Participants in the network are all equal, adhering to the same protocols. They can be individuals, state actors, organizations, or a combination of all these types of participants.

At its core, the system records the chronological order of transactions with all nodes agreeing to the validity of transactions using the chosen consensus model. The result is transactions that cannot be altered or reversed unless the change is agreed to by all members in the network in a subsequent transaction.