such as, John and Jill are two customers of the network. John records a transaction that may be encrypted with his private vital. from the late 1990s, Stuart Haber and W. Scott Stornetta employed Merkle trees to put into action a system in which document timestamps couldn't be tampered with. This was the 1st occasion within the heritage of blockch