A. Through Merkle trees
B. Through public/private key cryptography
C. Through consensus algorithms such as Proof of Work
D. By publishing only the block address
E. None of the above
Join a community of subject matter experts. Register for FREE to view solutions, replies, and use search function. Request answer by replying!