If everyone in your system replicates this linked list (and verifies its legitimacy by repeating the cryptographic hash functions), it will implement a slow and somewhat crude distributed database that’s resistant to tampering.Blockchain: the revolution we’re not ready for3.5K75Haseeb QureshiDeepak ChauhanFollowJul 30, 2017 · 1 min readI can’t make out with the highlighted part could you please elaborate this