Definition

A blockchain is a data structure and network protocol in which transactions are grouped into blocks, each block contains a cryptographic hash of the previous block, and the resulting chain is replicated across a distributed network of nodes that collectively enforce consensus rules. No single node controls the ledger. No single node can unilaterally rewrite history. The chain is append-only: new blocks are added, but existing blocks cannot be modified without invalidating every subsequent block’s hash—and convincing a majority of the network to accept the altered chain.

The concept was first implemented by Satoshi Nakamoto in the 2008 Bitcoin whitepaper, though its constituent technologies—hash chains, distributed consensus, and Merkle trees—predate it by decades.

Why It Matters

Blockchain networks processed over $3.7 trillion in on-chain transaction volume in 2024, according to Chainalysis. Ethereum alone hosts over 4,000 active decentralized applications and settles approximately 1.1 million transactions per day. Beyond cryptocurrency, blockchains serve as the coordination layer for decentralized identity (DIDs), verifiable credentials, supply chain provenance, and governance systems.

The architectural significance of blockchain for privacy infrastructure is not the ledger itself—public blockchains are radically transparent, recording every transaction for anyone to audit. The significance is the authentication model. Blockchain-based identity systems enable users to prove who they are (or that they have specific attributes) without centralized identity providers. Sign-In with Ethereum allows a user to authenticate to any application using only a wallet address and a cryptographic signature, with no email address, phone number, or password required.

This inverts the dependency model of the web. Instead of the application owning the identity and the user requesting access, the user owns the identity and the application requests verification.

How It Works

A blockchain operates through several coordinated mechanisms:

  1. Transaction creation: A user creates a transaction (e.g., a value transfer, a smart contract call) and signs it with their private key.
  2. Propagation: The signed transaction is broadcast to the network’s peer-to-peer gossip protocol.
  3. Block assembly: Validator nodes (miners in proof-of-work, stakers in proof-of-stake) collect pending transactions from the mempool and assemble them into a candidate block.
  4. Consensus: The network reaches agreement on which candidate block to append. In Ethereum’s proof-of-stake system, a randomly selected validator proposes the block, and a committee of attesters votes on its validity.
  5. Finalization: Once the block receives sufficient attestations, it is added to the chain. Each new block includes the hash of the preceding block, creating the cryptographic linkage that makes retroactive modification computationally infeasible.

Different blockchains make different tradeoffs. Bitcoin prioritizes security and decentralization at 7 transactions per second. Ethereum balances programmability with ~15 TPS on Layer 1, augmented by Layer 2 rollups that achieve thousands of TPS. Solana optimizes for throughput at 4,000+ TPS but with higher hardware requirements for validators.

Stealth Cloud Relevance

Stealth Cloud uses blockchain not as a storage layer—storing data on a public ledger would contradict every zero-knowledge principle—but as an authentication and identity layer. Wallet-based authentication via Sign-In with Ethereum (SIWE) allows Ghost Chat users to manifest (authenticate) without creating an account, providing an email, or trusting Stealth Cloud with any personally identifiable information.

The wallet address serves as a pseudonymous identifier. Stealth Cloud stores only a hash of the wallet address, never the address itself, meaning that even the pseudonymous identifier is one-way transformed. Blockchain provides the trust anchor for this authentication flow without requiring Stealth Cloud to operate any identity infrastructure of its own.

The Stealth Cloud Perspective

Blockchain’s gift to privacy is not the ledger—it is the key pair. A user with a private key can prove identity, sign messages, and authorize actions without any intermediary knowing who they are. Stealth Cloud builds on this primitive because the best identity system is one where the provider never learns the identity at all.