Key Takeaways
- A blockchain is a digital ledger shared across a network of computers that records information in a way that is difficult to alter or fake.
- Instead of a central authority such as a bank, independent computers known as nodes work together to verify every transaction.
- The technology is designed to be transparent, tamper resistant, and secure, and is used as the foundation for many cryptocurrencies and decentralised applications.

At its simplest, a blockchain is a way of recording information so that it is very hard to change after the fact. It is a digital ledger of transactions that is copied and shared across many computers on the network.
The name “blockchain” comes from how the data is arranged. Transactions are grouped into a block. Once a block is full, it is linked to the previous block using cryptography, which creates a chain of blocks in time order.
Each new block depends on the one before it. This link is what makes later tampering very difficult.
How it works: the shared spreadsheet analogy
To understand blockchain, think of a shared spreadsheet, similar to a Google Sheet.
In a traditional system such as a bank ledger, there is one main file that only the bank can change. You must trust the bank to keep accurate records and protect that file from unauthorised access.
A blockchain works differently. Imagine that the same spreadsheet is shared with thousands of people worldwide. Everyone can see it, and everyone stores an identical copy on their own computer.
- The network: These thousands of computers are called nodes.
- The process: When someone makes a transaction, it is broadcast to the network. The nodes check it against the rules of the system, then update their spreadsheets in line with each other.
- The security: If someone tries to change their own copy to show more funds than they really have, the other nodes can see that their version does not match the majority and will ignore it.
This is often called a “trustless” system. You do not need to rely on a single bank, company, or government. Instead, you rely on mathematics, open rules, and many different participants checking each other’s work.
Core characteristics of a blockchain
Public blockchains such as Bitcoin and Ethereum have several key traits that make them different from traditional databases.
Decentralisation
There is no single central point that controls the system. Data is stored on many computers across different countries and legal systems. No single government, company, or person can unilaterally decide how the network runs.
If one node goes offline, others still hold the same data, so the network can continue to operate.
Immutability
Once a transaction has been confirmed and added to a block, it is designed not to be changed or deleted. This is called immutability.
You can think of it as the difference between writing in pencil and carving into stone. Traditional databases can be edited in the background. On a blockchain, any attempt to rewrite history would be visible and would usually be rejected by honest nodes.
Transparency
On public blockchains, transaction data is visible to anyone who wants to inspect it. You can see which addresses sent and received crypto-assets, and when.
Most users are identified only by addresses, which are long strings of letters and numbers. This means activity is visible and auditable, but not directly tied to names unless extra information is provided.
The mechanics of verification
You might ask how thousands of strangers agree on which transactions are valid. This is handled by something called a consensus mechanism.
A consensus mechanism is a set of rules that all nodes follow to agree on the correct version of the ledger. Two of the most widely used types are:
-
Proof of Work (PoW)
Bitcoin uses Proof of Work. Specialised computers, called miners, compete to solve mathematical problems. The first to solve the problem can add the next block of transactions and receives a reward in new bitcoins plus transaction fees.
This process uses significant energy but makes it expensive to attack the network. -
Proof of Stake (PoS)
Networks such as Ethereum and Solana use Proof of Stake. Instead of using large amounts of electricity, participants called validators lock up, or “stake”, some of their crypto-assets as collateral.
If they follow the rules and add valid blocks, they receive rewards. If they try to cheat, part of their stake can be taken away.
Both systems aim to make it more costly to attack the network than to behave honestly.
How blockchain evolves: forks and layers
Blockchains are run by software, and software needs updates from time to time. In crypto, you will often hear about forks and layers.
Forks
A fork happens when the rules of a blockchain are changed.
Developers or the wider community might want to fix a bug, improve security, or add a new feature. If enough participants agree, the network upgrades and continues running.
There are two main types:
- Soft fork: A change that is backward compatible. Nodes that have not upgraded can still understand the new blocks, similar to opening a document that was created with a newer version of a word processor.
- Hard fork: A change that is not backward compatible. The network can split into two separate blockchains that share the same history up to the fork, then go their own ways. This can create a new crypto-asset, as happened with Bitcoin and Bitcoin Cash.
Hard forks can be planned or can arise from disagreements about how the project should develop.
Layer 2 scaling
As some blockchains became busy, users experienced slower confirmation times and higher fees. To help with this, developers created systems known as Layer 2 networks.
Think of the main blockchain (Layer 1) as a very secure but crowded motorway. Layer 2 networks are like smaller, faster roads that sit on top of it. Many transactions can take place on Layer 2 at lower cost, then the final outcome is recorded back on the main chain.
This approach aims to keep strong security at Layer 1, while making everyday use cheaper and more practical at Layer 2.
Real-life examples
Blockchains provide the base layer for many different digital assets and applications. Below are three well known examples, each with its own design choices and risks.
Bitcoin (BTC)
Bitcoin was the first widely used public blockchain. Its main purpose is to move value from one person to another without a central authority.
The protocol is relatively simple compared with newer projects. That simplicity is intentional and is often seen as a strength, although it also means Bitcoin does less than more programmable networks.
Ethereum (ETH)
Ethereum introduced the idea of a programmable blockchain for general use. Instead of only sending and receiving its native asset, ether (ETH), users can interact with small pieces of code called smart contracts.
Smart contracts are programs that run on the blockchain. They can power decentralised applications (dApps) such as lending platforms, decentralised exchanges, games, and markets for non-fungible tokens (NFTs).
Because they run on the blockchain, everyone can see the rules and check how they behave.
Solana (SOL)
Solana is an example of a high-throughput blockchain that aims to process thousands of transactions per second with relatively low fees.
It is designed for use cases that require frequent transactions, such as certain payment systems, trading tools, and games. Its design choices, such as higher hardware requirements, involve different trade-offs to networks like Bitcoin and Ethereum.
Security risks and red flags
Blockchain technology can be robust, but using it safely depends heavily on user behaviour and on the quality of the services you choose.
Irreversible transactions
Because blockchains are intended to be immutable, crypto transactions are usually final once confirmed.
If you send funds to the wrong address or to a fraudster, there is typically no central party that can reverse the payment. Many wallets will warn you about this, but it is still your responsibility to check.
Always verify the address carefully and, for larger amounts, consider sending a small test transaction first.
Wallet security
Your access to your crypto-assets depends on your private key or recovery phrase. Think of this as a master key to your funds.
If you lose this key and have no backup, you will normally lose access to your assets. If someone else obtains it, they can spend your funds without your consent.
Keep your recovery phrase offline, never share it with anyone, and be cautious of websites or apps that ask you to enter it.
Smart contract bugs
On programmable blockchains such as Ethereum, attackers often target weaknesses in dApps, not the base blockchain itself.
Bugs in smart contracts can allow hackers to steal funds or lock them permanently. Some projects pay for security audits and have longer track records, which can reduce (but not remove) risk.
Before using a dApp, it is wise to check who built it, whether the code has been audited, and how it is governed.
A word on scale and security
While this guide uses simplified analogies like shared spreadsheets to explain blockchain concepts, the underlying technology is considerably more complex.
The description of blockchains as extremely difficult to change or cheat holds true for large, established networks like Bitcoin and Ethereum, where enormous computational power or significant capital is staked across thousands of nodes worldwide.
However, smaller or newer blockchains with fewer participants, less computational power, or smaller validator pools can be more vulnerable to attacks.
When evaluating a blockchain project, consider not just the technology itself but also the size and maturity of the network securing it. A blockchain's real-world security depends heavily on how many independent participants are actively maintaining and protecting the chain.
Why blockchain matters
Blockchain technology offers a different way to coordinate data and value between people and organisations that may not know or fully trust each other.
Instead of relying on a central party to keep the record, participants can share a common ledger that anyone can verify. This can make some types of transfers and agreements more open and harder to quietly alter.
It also allows new types of applications, such as decentralised finance (DeFi) protocols and user-owned digital items.
The technology is still developing and remains experimental in many areas. It faces challenges, including regulation, usability, energy use for some networks, and security risks in new applications. Even so, many developers, companies, and public bodies in Europe and around the world are testing how blockchains might support future financial and non-financial services.

CoinJar
CoinJar is one of the longest-running cryptocurrency exchanges in the world. Since 2013, we’ve helped hundreds of thousands of people worldwide to buy, sell and spend billions of dollars in Bitcoin, Ethereum and dozens of other cryptocurrencies.
Read full bio


