# Proof-of-Proof (PoP)

{% hint style="info" %}

## 📜 **TL;DR:**

* The Hemi Network utilizes **Proof-of-Proof (PoP)** to leverage Bitcoin's renowned security.
* **PoP Miners** enhance security by publishing Hemi's network data on Bitcoin's blockchain.
* Bitcoin confirmations further bolster Hemi's defenses, ensuring a robust and secure network.
  {% endhint %}

***

## 🛡️ Inherits Bitcoin's Security

* Hemi's network capitalizes on Bitcoin's formidable security through a mechanism known as **Proof-of-Proof (PoP)**. This approach allows Hemi to inherit the solid Proof-of-Work (PoW) security of Bitcoin.

***

## 🔍 How?

* To achieve this, Hemi deploys specialized miners, referred to as **PoP Miners**. These miners are responsible for:
  * Gathering crucial network details and publishing them on Bitcoin's blockchain, thereby linking Hemi's security directly to Bitcoin's proven system.
  * Employing sophisticated algorithms to generate proofs that are vital for the network's security.
  * Ensuring Hemi's network integrity by leveraging Bitcoin's security, providing a dual layer of protection.
* This integration with the Bitcoin blockchain affords Hemi an additional security layer, utilizing Bitcoin's PoW system as a basis for resolving disputes and ensuring trustworthiness.

***

## 🏗️ Block Confirmations

* New segments in the Hemi chain receive confirmations from Bitcoin, significantly raising the barrier for potential attacks. These confirmations:
  * Serve as **"security bricks,"** each one strengthening the network's defenses.
  * Ensure that any attempt to compromise the network requires substantial power, making unnoticed attacks virtually impossible.
  * As Bitcoin confirmations accumulate, the Hemi Network's "security wall" becomes increasingly formidable, creating an effective deterrent against malicious actors.

***

## 🔚 Conclusion

* The **Proof-of-Proof (PoP) consensus mechanism** uniquely positions the Hemi Network by:
  * Allowing Bitcoin miners to secure Hemi indirectly, without direct involvement in Hemi's consensus processes.
  * Facilitating scalable transaction throughput in the Hemi ecosystem without expanding its Bitcoin footprint significantly.
  * Setting a high barrier for network reorganizations, as disrupting Hemi would necessitate a highly improbable 51% attack on Bitcoin itself, a task too daunting even for nation-states.
* This approach not only extends Bitcoin's security to the Hemi Network but also introduces a scalable, robust framework for transaction processing and network integrity.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.hemi.xyz/foundational-topics/the-architecture/proof-of-proof.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
