Bookchain transaction

Chunk ID 64
Content est nodes control the network, but is more vulnerable if the network is overpowered by an attacker. While network nodes can verify transactions for themselves, the simplified method can be foole