If an attacker makes an attempt to tamper that has a block’s data, the next blocks will crack Because the hash values have improved. The nodes can quickly discover such a circumstance because the miners or validators nodes will invalidate many of the modifications. This eliminates the necessity for Bodily documentation and ensures data can't be