Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Small edit to improve grammar and clarity #6404

Merged
merged 2 commits into from
Nov 21, 2024
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 4 additions & 4 deletions docs/general/web3-and-polkadot.md
Original file line number Diff line number Diff line change
Expand Up @@ -79,10 +79,10 @@ distributed state machines where increments of data are stored within blocks tha
other using hash functions. For example, the hash of block `N + 1` contains data of that block
together with the hash of the previous block `N`. This creates the situation where if you modify the
content of block `N` you will change the hash of block `N + 1`, `N + 2`, etc. essentially breaking
the chain. Although it can be possible to add an invalid block (a block with invalid transactions)
or censor certain transactions, if the blockchain network is not sufficiently decentralized. In
decentralized proof-of-stake blockchains like Polkadot such attacks are financially expensive, and
attempting to do it can get you [slashed](../learn/learn-offenses.md).
the chain. If a blockchain network is not sufficiently decentralized, it can be possible to add an
invalid block (a block with invalid transactions) or to censor certain transactions. In decentralized
proof-of-stake blockchains like Polkadot however, such attacks are financially expensive and
attempting them can get you [slashed](../learn/learn-offenses.md).

So, with blockchain as a means of storing data and transactions permanently without an option to
modify them, we can ensure what we cryptographically sign with our digital identity is set in stone
Expand Down
Loading