We primarily use blockchain technology to manage peer-to-peer transactions (cryptocurrency) and the supply chain. Both require us to keep a tamper-proof record of the transactions to maintain transparency.
Blockchain is the first technology to protect stored data from being tampered with. It has a
Every block in a blockchain has a block header that contains information about the block and the block's
Note: Read more about a block in a blockchain here.
If any of the fields in a block are changed, then the entire hash of the block would change (due to the avalanche effect property of cryptographic hash functions). This will cause the unchaining of the blockchain. Blockchain is a decentralized network where we add blocks to the blockchain after a majority consensus. Thus, if other nodes see any unchaining of the blockchain, they will not accept those blocks.
The malicious node needs to change the "previous hash" field of the following block to make this attack successful. It would change the hash of that block as well. Then they will have to update the "previous hash" field of the next block. They will have to do this until they reach the last mined block, then broadcast their chain to the whole network. This attack is called the 51% attack.
Note: Read more about the 51% attack here.
Hence, blockchain is popular as it is a tamper-proof way of storing data. Moreover, it is a decentralized network. Thus, no single entity can manipulate the data making the network more secure.