If an attacker attempts to tamper using a block’s data, the following blocks will break since the hash values have modified. The nodes can quickly establish such a scenario because the miners or validators nodes will invalidate every one of the alterations. In basic conditions, the consensus is a choice-building procedure for the network to conc