Krutika Adani
A user initiates a transaction (e.g., sending crypto).
The transaction gets encrypted and broadcasted to the network.
Nodes (computers) in the network verify the transaction.
Proof-of-Work (PoW) or Proof-of-Stake (PoS) ensures legitimacy.
Verified transactions are grouped into a block.
The block is added to the existing chain of transactions.
Each block has a unique hash linking it to the previous block.
This makes it tamper-proof and highly secure.
Decentralized – No central authority controls it.
Transparent – Everyone can verify transactions.
Secure – Immutable records prevent fraud.