Additionally, since the chronology on the blockchain is eternal, you can always go back and check. Each device retains its privacy, even if we can trace its communications by a unique string of letters and numbers. And if we extend encryption to all networks, it could have a serious impact on DDoS attacks. Such a two-key system will be a determining factor in the fight against hacking attempts.