Don’t invest unless you’re prepared to lose all the money you invest. This is a high‑risk investment and you should not expect to be protected if something goes wrong. Take 2 mins to learn more.

    What Is a Blockchain? A Simple Guide to the Tech Behind Crypto

    Understanding the decentralised digital ledger technology used by Bitcoin, Ethereum and many other cryptoassets.

    May 1, 2023

    Key Takeaways

    • A blockchain is a digital ledger shared across a network of computers that records information in a way that is difficult to alter or fake.
    • Instead of a central authority such as a bank, independent computers known as nodes work together to verify every transaction.
    • The technology is designed to be transparent, tamper resistant, and secure, and is used as the foundation for many cryptocurrencies and decentralised applications.
    what is blockchain? what is the blockchain, best crypto exchange

    At its simplest, a blockchain is a way of recording information so that changing past records is very difficult. In practice, it is a digital ledger of transactions that is duplicated and distributed across a network of computers.

    The term “blockchain” comes from how the data is stored. Transactions are grouped into a block. When a block is full, it is linked to the previous block, creating a chain of blocks in time order.

    This structure is designed to make the history of transactions harder to alter. It does not make the system perfect or risk free, but it does raise the cost and difficulty of tampering with past data.

    How it works: The shared spreadsheet analogy

    To picture a blockchain without technical language, think about a simple spreadsheet.

    In a traditional system, such as a bank ledger, there is one master file that only the bank can update. You must trust the bank to keep accurate records and to protect that file.

    A public blockchain works differently. Imagine that the same spreadsheet is copied and shared with thousands of people around the world. Everyone can view it, and each person holds their own copy on their computer.

    • The network: These thousands of computers are called nodes. They run software that follows the same set of rules.
    • The process: When someone broadcasts a new transaction, the nodes check it against the rules, then update their copy of the ledger if they agree it is valid.
    • The security: If someone tries to edit their own copy to give themselves more money, it will not match the copies held by the other nodes. The network will reject the invalid version.

    People often describe this as a “trustless” system, meaning you do not need to trust one central institution. However, you still rely on the code, the developers, the hardware, the internet connection and the honesty of a large number of participants. None of these are risk free.

    Core characteristics of a blockchain

    Public blockchains such as Bitcoin and Ethereum have some common features that set them apart from traditional databases.

    Decentralisation

    Data is stored on many computers around the world, not in a single company’s data centre. This can reduce reliance on any one party and can make the network harder to shut down.

    However, decentralisation is rarely perfect. Mining power, validators, developers or large holders of a token can still gain influence. Users should not assume that every blockchain is fully decentralised or neutral in practice.

    If one node goes offline, the network usually keeps running. That said, major outages, software bugs or attacks can still disrupt service or slow transaction processing.

    Immutability

    Once a transaction has been confirmed and added to a block, and that block has enough further blocks built on top of it, it is designed to be extremely difficult to change. This is often called immutability.

    It is helpful to think of it as “very hard to alter”, rather than absolutely permanent in every situation. In theory, a group with enough computing power or influence could reorganise part of the chain, and some networks have made changes to reverse specific incidents.

    For everyday users, this usually means that sending a transaction is final. You cannot simply edit or cancel it later as you might with a draft document.

    Transparency

    On a public blockchain, transaction data is visible to anyone who wants to look. You can see the movement of funds between addresses and view the history of a particular wallet.

    Most blockchains use pseudonyms. Instead of names, you see long strings of letters and numbers. However, with enough data and analysis, it can be possible to link these addresses to real people or organisations. Users should not assume full privacy.

    This level of transparency can help with auditing and on-chain analysis, but it also creates new risks around surveillance, data leakage and targeted attacks.

    The mechanics of verification

    You might wonder how thousands of strangers manage to agree on which transactions are valid. The method used is called a consensus mechanism.

    A consensus mechanism is a set of rules that the network follows to decide which version of the ledger is correct. Different blockchains use different methods, each with its own trade-offs, costs and risks.

    Two of the most common types are:

    1. Proof of Work (PoW)
      This is used by Bitcoin. Computers called miners compete to solve cryptographic puzzles. Solving the puzzle lets them propose a new block of transactions.
      This process uses a large amount of electricity and specialised hardware, which can be expensive and has environmental impacts. In return, it makes it harder for a single attacker to rewrite the chain, because they would need to control a significant share of the total computing power.

    2. Proof of Stake (PoS)
      This model, used by Ethereum and Solana, asks participants called validators to lock up, or “stake”, their tokens. Validators help process transactions and create new blocks.
      If a validator behaves dishonestly, some of their stake can be taken away. This is designed to align incentives, but it introduces other risks, such as smart contract bugs, validator concentration and the possibility of large stakers having more influence over the network.

    Neither model guarantees security. Both rely on economic incentives, proper implementation and broad participation. Changes in regulation, technology or market conditions can affect how secure a particular blockchain really is over time.

    How blockchain evolves: Forks and layers

    Blockchains are built from software. Like any software, they sometimes need upgrades, bug fixes or new features. This is where forks and layers come in.

    Forks

    When developers or the community want to change a blockchain’s rules, they propose an update. If everyone upgrades to the new version, the network continues on a single path.

    If there is serious disagreement, the chain can split into two separate blockchains that share history up to a point, then diverge. This is called a fork.

    • Soft fork: A change that is backward compatible. Nodes that do not upgrade can often still work with upgraded nodes, at least for a time.
    • Hard fork: A more drastic change that is not backward compatible. The network splits, sometimes creating a new cryptocurrency, as happened with Bitcoin and Bitcoin Cash.

    Forks can create confusion and volatility. They may affect which version of a token you hold, how wallets and exchanges support it and which chain developers focus on in future.

    Layer 2 scaling

    As some blockchains became busier, using them directly could be slow and expensive, especially during times of high demand. To help with this, developers created “Layer 2” networks.

    You can think of the main blockchain, called Layer 1, as a crowded motorway. Layer 2 solutions aim to move some of the traffic into side roads, then record the final result back on the main road.

    Layer 2s usually process many transactions off the main chain, then submit summaries or proofs to Layer 1. The goal is to offer faster and cheaper transactions while still using the security of the base chain.

    Each Layer 2 comes with its own technology, assumptions and risks. For example, some rely heavily on a small group of operators or complex smart contracts. Users should understand that using a Layer 2 may add new technical and counterparty risks, even if fees appear lower.

    Real-life examples

    Blockchains now support a wide range of digital assets and applications. Below are some of the better known networks. These are examples, not recommendations, and their value and reliability can change quickly.

    Bitcoin (BTC)

    Bitcoin is the original widely used public blockchain. Its main purpose is to let people transfer value without relying on a central authority.

    Many view it as a type of digital store of value or as a medium of exchange. However, its price has been very volatile in both short and long time periods, and there is no guarantee that it will hold or increase its value in future.

    The Bitcoin protocol focuses on a narrow set of features, such as sending and receiving BTC securely. This simplicity can help limit some types of risk, but it also restricts what the network can do compared to more programmable blockchains.

    Ethereum (ETH)

    Ethereum introduced the idea of a programmable blockchain. Developers can write code known as smart contracts that run directly on the Ethereum network.

    These smart contracts power decentralised applications (dApps) for things like lending, trading, gaming and digital collectibles such as NFTs. Although these tools can offer new ways to interact with digital assets, they also create additional layers of risk.

    Smart contracts can have bugs or security flaws. Some projects are experimental or unaudited. Users may face losses due to hacking, coding errors, poorly designed token models or outright fraud, separate from the price risk of ETH itself.

    Solana (SOL)

    Solana is designed to be a high performance blockchain. It aims to handle thousands of transactions per second with very low fees.

    This makes it attractive for use cases such as payments, trading and gaming. However, achieving high throughput involves different technical choices and trade-offs around decentralisation, hardware requirements and network resilience.

    Solana, like other newer networks, has experienced outages and technical incidents. These can affect your ability to move or trade assets when you want to, which is an important risk to consider.

    Security risks and red flags

    Although blockchain technology is designed with security in mind, using it in practice comes with significant responsibilities and risks. Many losses in crypto occur because of human error, scams, hacks or technical failures rather than attacks on the base blockchain itself.

    Irreversible transactions

    Because blockchain transactions are designed to be final, sending funds is usually irreversible.

    If you send crypto to the wrong address, to a smart contract that does not support refunds or to a scammer, it is extremely unlikely that you will get it back. There is often no central party who can reverse or cancel the transfer.

    You should always double check addresses, networks, amounts and fees before sending any funds. Even small mistakes can lead to a permanent loss of your money.

    Wallet security

    Access to your crypto is controlled by private keys. These work a bit like very long passwords.

    If you lose your private key or recovery phrase, you may permanently lose access to your funds. Unlike a bank account, there is usually no “forgot password” option.

    If someone else obtains your private key, they can move your assets without your consent. Common threats include phishing emails, fake wallet apps, malware, keyloggers and social engineering.

    Storing keys safely requires care and planning. For example, you might use hardware wallets, secure backups and offline storage. Each method has pros and cons and none is completely risk free.

    Smart contract and platform risks

    On programmable blockchains, many people interact with dApps, decentralised exchanges and other services run by smart contracts.

    Hackers may try to find bugs in these contracts. If they succeed, they can sometimes drain large amounts of funds in a short time. Even audited contracts can have unknown flaws.

    There are also project-level risks. Teams can abandon a project, change its rules in a way that harms users, or, in some cases, run away with user funds. Centralised platforms that hold customer assets can also fail or be hacked.

    Before using any application, it is sensible to research who built it, how it is governed, whether the code has been audited and what would happen to your funds in different scenarios. Even with research, you may still face unexpected losses.

    A word on scale and security

    While this guide uses simplified analogies like shared spreadsheets to explain blockchain concepts, the underlying technology is considerably more complex. The description of blockchains as extremely difficult to change or cheat holds true for large, established networks like Bitcoin and Ethereum, where enormous computational power or significant capital is staked across thousands of nodes worldwide. However, smaller or newer blockchains with fewer participants, less computational power, or smaller validator pools can be more vulnerable to attacks. When evaluating a blockchain project, consider not just the technology itself but also the size and maturity of the network securing it. A blockchain's real-world security depends heavily on how many independent participants are actively maintaining and protecting the chain.

    Why blockchain matters

    Blockchain technology offers a different model to traditional finance and internet services.

    Instead of relying mainly on central authorities such as banks or large technology firms, blockchains aim to let many participants share and verify data directly. In theory, this can support systems that are more open, programmable and resistant to censorship.

    In practice, using blockchain-based services today often involves high risk, complex user journeys and frequent technical change. There are real opportunities for innovation, but also a long history of hacks, scams, failed projects and sharp price swings.

    As the technology matures, some blockchains and related tools may become part of the backend infrastructure of digital services. There is no certainty about which networks, if any, will achieve long term adoption or sustainable value.

    If you decide to use or invest in cryptoassets that run on blockchains, you should only do so with money you can afford to lose, and you should take time to understand both the potential benefits and the very real risks.

    coinjar author, best crypto exchange

    CoinJar

    CoinJar is one of the longest-running cryptocurrency exchanges in the world. Since 2013, we’ve helped hundreds of thousands of people worldwide to buy, sell and spend billions of dollars in Bitcoin, Ethereum and dozens of other cryptocurrencies.

    Read full bio

    Standard Risk Warning: The above article is not to be read as investment, legal or tax advice and it takes no account of particular personal or market circumstances; all readers should seek independent investment advice before investing in cryptocurrencies.

    The article is provided for general information and educational purposes only, no responsibility or liability is accepted for any errors of fact or omission expressed therein. Past performance is not a reliable indicator of future results. We use third party banking, safekeeping and payment providers, and the failure of any of these providers could also lead to a loss of your assets.

    We recommend you obtain financial advice before making a decision to use your credit card to purchase cryptoassets or to invest in cryptoassets.

    Capital Gains Tax may be payable on profits.

    CoinJar's digital currency exchange services are operated in the UK by CoinJar UK Limited (company number 8905988), registered by the Financial Conduct Authority as a Cryptoasset Exchange Provider and Custodian Wallet Provider in the United Kingdom under the Money Laundering, Terrorist Financing and Transfer of Funds (Information on the Payer) Regulations 2017, as amended (Firm Reference No. 928767).

    In the UK, it's legal to buy, hold, and trade crypto, however cryptocurrency is not regulated in the UK. It's vital to understand that once your money is in the crypto ecosystem, there are no rules to protect it, unlike with regular investments.

    You should not expect to be protected if something goes wrong. So, if you make any crypto-related investments, you're unlikely to have recourse to the Financial Services Compensation Scheme (FSCS) or the Financial Ombudsman Service (FOS) if something goes wrong.

    The performance of most cryptocurrency can be highly volatile, with their value dropping as quickly as it can rise. Past performance is not an indication of future results.

    Remember: Don't invest unless you're prepared to lose all the money you invest. This is a high-risk investment and you should not expect to be protected if something goes wrong. Take 2 mins to learn more.

    UK residents are required to complete an assessment to show they understand the risks associated with what crypto/investment they are about to buy, in accordance with local legislation. Additionally, they must wait for a 24-hour "cooling off" period, before their account is active, due to local regulations. If you use a credit card to buy cryptocurrency, you would be putting borrowed money at a risk of loss.

    We recommend you obtain financial advice before making a decision to use your credit card to purchase cryptoassets or to invest in cryptoassets.

    CoinJar logo

    CoinJar

    Get the app.