Back to replicas

Engineering Sandbox bridge ยท blockchain sequence

Move through hashing, signing, and privacy in one local path.

This bridge page is intentionally compact. It does not rewrite the demos. It simply gives the Anders family one clean order: first understand chained state, then authenticity, then proof without disclosure.

3 linked labs 4 local routes in the path 1 recommended first walkthrough
Recommended order

Start with the chain-breaking mechanics in Blockchain, move to signatures once state and trust feel concrete, then finish with the zero-knowledge map when you are ready to think about privacy instead of authenticity.

Start with hashing Docs Open primary hub
1

Hashing and linked blocks

Begin with block fields, nonce updates, and the tamper cascade. This chapter builds the intuition for why changing one block invalidates everything downstream.

Estimated time: 6-8 minutes

  • Start with the editable block fields and the mining button.
  • Move into the distributed-chain view once the single-chain behavior feels clear.
  • Use this chapter to anchor later signing and proof ideas in a concrete chain state.
2

Keys, signatures, and transactions

Continue into key generation, signing, verification, and transaction flow. This chapter explains how authenticity gets attached to data before it becomes part of a chain.

Estimated time: 8-12 minutes

  • Generate a keypair and observe how the public identity changes with the private key.
  • Sign a payload, then mutate it to watch verification fail.
  • Finish by tracing how signed transactions feed the blockchain-focused scenes.
3

Proof without disclosure

End with the map-based proof scene. It shifts the lesson from authenticity to privacy by showing how repeated verification can build confidence without exposing the secret path.

Estimated time: 5-8 minutes

  • Toggle the hidden coloring overlay to see the secret partition.
  • Shuffle the palette and test different region choices without changing the logic.
  • Reset the scene to compare visible evidence with hidden structure.

Suggested order

The recommended first pass is hashing, then signing, then proof. That order keeps the state model simple: first immutable records, then authenticity, then privacy.

Local-only navigation

Every route link on this page points at local replicas. The public body avoids upstream chapter links so the flow stays self-contained under the shipped site shell.

What this page is for

This route is intentionally a roadmap, not a rewrite of the demos. It helps readers move through the existing replicas with a more coherent teaching sequence.

Other hub paths

When you want a broader tour after this sequence, continue into the Primary Interactive Hub for social systems and story-driven sims, or the Music Interactive Hub for ear training, sequencing, synthesis, and genre history.