Building a Tamper Proof EIP-compliant Distributed Ledger
There are only two specific technologies that are required to build a tamper resistant EIP-compliant distributed ledger implementation. These are described in the webpages below entitled
- “Distributed Ledgers” and
- “Hash Functions”
A tamper proof distributed ledger is not required to make the protocol work, but it enhances the security and robustness of any EIP implementation. Their use is strongly encouraged and will be implemented by a core set of nodes on the Distributed Ledger Network, if not all of them wherever scalability is a requirement