Overview
Verification is the process by which every Bitcoin node independently validates that transactions and blocks comply with the protocol's consensus rules. This autonomous verification is what makes Bitcoin trustless — no participant needs to rely on any other participant's claims about the state of the ledger. Every full node can independently determine whether a transaction or block is valid.
What Gets Verified
Transaction Verification
When a node receives a new transaction, it checks:
- All referenced inputs exist in the UTXO set (the coins have not already been spent)
- The spending conditions are properly satisfied (valid signatures, correct hash preimages, timelocks met)
- Input values equal or exceed output values (no inflation)
- The transaction is properly formatted and within size limits
- Scripts execute successfully and conform to standardness rules
Block Verification
When a node receives a new block, it checks:
Block Verification Checklist:
┌─────────────────────────────────────────────┐
│ ✓ Block header hash meets difficulty target │
│ ✓ Timestamp is within acceptable range │
│ ✓ Block size is within limits │
│ ✓ First transaction is a valid coinbase │
│ ✓ Coinbase reward ≤ subsidy + fees │
│ ✓ All transactions are individually valid │
│ ✓ No double-spends within the block │
│ ✓ Merkle root matches transactions │
│ ✓ Previous block hash references known block│
└─────────────────────────────────────────────┘
"Don't Trust, Verify"
This phrase encapsulates Bitcoin's security model. Rather than trusting miners, exchanges, or any third party, users who run full nodes verify everything independently. This is fundamentally different from traditional financial systems where trust is delegated to banks, payment processors, and regulators.
Verification vs. SPV
SPV nodes perform partial verification — they check proof-of-work in block headers and Merkle inclusion of transactions but do not validate every transaction or consensus rule. Only full nodes perform complete verification, which is why running a full node provides the highest security guarantee.
Common Misconceptions
Verification is not the same as mining. Miners perform verification as part of their process, but they also expend computational energy to find valid block hashes. All full nodes verify, but only miners create new blocks.