The 5 requirements for Hash algorithms
- One way
 
- Deterministic
 
- Fast computation
 
- The Avalanche Effect
 
- Must withstand collisions
 
P2P Network
- A hacker can only take over the network if they tampered more than 50% of the blockchain nodes at the same time and in a very short time.
 
- The more nodes there is in the blockchain, it's more difficult to hack the blockchain.
 
- The blockchain will constantly check if there is invalid blocks and copy it over to the valid ones. → auto update the chain to valid blocks.
 
- This is how the blockchain brings trust to a trustless environment.
 
Previous Hash
- Previous hashes creates a cryptographic link between blocks.
 
Block Nonce
- Block number + Data + Previous hash + Nonce (vary) = Hash