Intro: A Tamper-Evident Database

Now that we know about cryptographic hash functions and their properties, how do we then apply them to design our tamper evident database for Bitcoin? In this section, we’ll be taking a look at the structure of a block, looking specifically at some of the metadata contained within the block header that will help us achieve tamper evidence.

Tamper-Evidence