Continuing the discussion from Homework on Security & Immutability - Questions:
You are correct, but can you please next time answer the question in the same thread instead of creating a new one. Its easier for us to track them
It runs on a math protocol that can’t be hacked. Everyone is using the same infrastructure to build their applications on and everyone can check it.
Once a transaction happens on the network, it stays there forever and can’t be taken off.
Because there is a potential of corruption, data can be hacked, manipulated and sold to the third parties.