After having addressed the main features of the blockchain and outlined its main threats, we now deal with the mechanisms used to create trustless networks. Trustless networks are those networks that do not need to introduce a privileged node that guarantees trust within the entire network. On the contrary, trustless networks exploit the characteristics of decentralized networks, such as peer-to-peer (P2P) networks, to achieve trust in the network.
Over the course of this chapter, we will be using Bitcoin's blockchain as reference, since it represents the most successful case of blockchain, namely, Bitcoin's blockchain. We will also deal with the management of transactions within the blockchain, analyzing in detail the mechanisms for creating and synchronizing blocks.
We will conclude the chapter by analyzing the security aspects associated...