Understanding the role of peer-to-peer networks
In order to apply a blocking registry as a register for storing transaction data, we must have the ability to check the block to see if someone has actually performed the transaction on our address or purse.
If the blocking system was stored only on one computer, which would for some reason be disconnected, at least it would be very annoying. Therefore, the current state of the block is synchronized and becomes available for a huge number of computers around the world.
These computers are called "nodes", and they work each in a peer-to-peer network to ensure the security and up-to-date data of the blocking. Each of these nodes stores a complete, updated version of the blockbuster. Each time a new block is added, each node on the network updates its copy of the block. The use of a peer-to-peer network has several advantages:
You can always check the status of the blocking system yourself using the browser blocker;
Do not rely on any one side to find out the true state of the block;
You do not need to rely on one server to ensure the security of the data from the blockroom;
To crack a blocker, an attacker will have to crack thousands of computers at the same time instead of a single server;
You can be sure that the data of the block will never be deleted, because they will have to be deleted from all nodes.
Client-server model against peer-to-peer network
Client-server model against peer-to-peer network
This is all very important, but this alone does not mean that the security of the block is maintained at a sufficient level for its real application to store valuables or conduct transactions with them.
For example, how can we know that the data (transactions) in the block are correct? How can I know that there are no invalid transactions in the blocks? And if there are different versions of the blockbuster, how do you know which one of them represents the true state of the block?
All these fears are solved in a very ingenious way by applying the consensus mechanism, the use of which became possible, first of all, thanks to the peer-to-peer network.
In order to apply a blocking registry as a register for storing transaction data, we must have the ability to check the block to see if someone has actually performed the transaction on our address or purse.
If the blocking system was stored only on one computer, which would for some reason be disconnected, at least it would be very annoying. Therefore, the current state of the block is synchronized and becomes available for a huge number of computers around the world.
These computers are called "nodes", and they work each in a peer-to-peer network to ensure the security and up-to-date data of the blocking. Each of these nodes stores a complete, updated version of the blockbuster. Each time a new block is added, each node on the network updates its copy of the block. The use of a peer-to-peer network has several advantages:
You can always check the status of the blocking system yourself using the browser blocker;
Do not rely on any one side to find out the true state of the block;
You do not need to rely on one server to ensure the security of the data from the blockroom;
To crack a blocker, an attacker will have to crack thousands of computers at the same time instead of a single server;
You can be sure that the data of the block will never be deleted, because they will have to be deleted from all nodes.
Client-server model against peer-to-peer network
Client-server model against peer-to-peer network
This is all very important, but this alone does not mean that the security of the block is maintained at a sufficient level for its real application to store valuables or conduct transactions with them.
For example, how can we know that the data (transactions) in the block are correct? How can I know that there are no invalid transactions in the blocks? And if there are different versions of the blockbuster, how do you know which one of them represents the true state of the block?
All these fears are solved in a very ingenious way by applying the consensus mechanism, the use of which became possible, first of all, thanks to the peer-to-peer network.