Summary
This chapter took us on a journey where we learned how to handle large data files on a blockchain. Given that data sensitivity is a concept that is a necessity given the current developments in the World, we learned some simple methods to implement the security of a blockchain. We then learned about the process of verifying the identity of a real-world user on a blockchain with the help of third parties, and learned how to sign a document with the help of a blockchain. The next chapter will teach us the basic concepts and methods required to use Ethereum outside our browsers, and also how it is used as the backbone of the IoT. We will also take a quick glance at the physical components that make up a blockchain.