When the information in the block is encrypted and used in the following block, the block is not inaccessible or non-readable. The hash is used in another block, then its hash is used in the following, and the like, but all blocks might be go through.ا?أ?راد ا?أع?ا? ا??ط?ر?? ا?بدا?ة ??? ?ع??