Not exactly, this gets into the underlyi g ctyptography used by the tech, called a Merkle Tree. Honestly, I can't say I fully understand it lol. It makes sense, but I am not a cryptography expert. In any case, I would recommend this article (pdf format), the original whitepaper published by "Satoshi Nakamoto".