PROOF OF AUTHORITY
The Hashing Process
When a User A transfer E3T to User B, this transaction will be hashed with SHA3-256 and stored in a candidate block.
When all the transactions in the candidate block have been verified, the candidate becomes a validated block.
This block will then be appended to the E3T Private Blockchain.
How Immutability Works?
Any changes in the blocks will make the entire chain of blocks behind invalid and only valid chains are copied to all nodes in the network.
E3T blockchain architecture employs the PoA consensus protocol where the blocks will be validated by the chosen validator nodes, instead of using ‘Miners’ like the PoW consensus protocol.