Chapter 6. The blockchain
This chapter covers
- Improving spreadsheet security
- Lightweight (SPV) wallets
- Reducing wallet bandwidth requirements
In chapter 5, we discussed transactions that let anyone verify all transactions in the spreadsheet. But there are still things verifiers can’t verify—that Lisa doesn’t remove or censor transactions. We’ll handle censorship resistance in chapters 7 and 8. This chapter examines how to make it impossible for Lisa to remove or replace transactions without also making it obvious that she’s tampered with the transaction history.
Lisa does this by replacing the spreadsheet with a blockchain (figure 6.1). The blockchain contains transactions that are secured from tampering through hashing and signing the set ...
Get Grokking Bitcoin now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.