In this chapter, we have dealt with various topics concerning the functioning of the blockchain, making particular reference to Bitcoin. We learned the features and vulnerabilities connected with network discovery mechanisms within trustless networks implemented through P2P protocols, and we focused, in particular, on the characteristics of block synchronization and blockchain transaction management, analyzing the vulnerabilities and possible threats to their integrity. The chapter concluded with the management of the security of the private keys stored inside the wallet keys.
We are now ready to analyze the architectural features and safety aspects of one of the most popular DLTs, namely, Hyperledger Fabric, which will be the topic of the next chapter.