In a method for protecting a networked military system from malicious users, transactions between the users of the networked military system are stored in a distributed database. Using a block chain method makes it possible to securely store important information in the network and to protect it from manipulation by intruders.
展开▼