Too Long; Didn't Read
In part I of this <a href="https://hackernoon.com/trust-model-of-bitcoin-part-i-34aacf47d444" target="_blank">two-part series</a>, we explored how transactions are sealed cryptographically making it impossible for anyone, except the owner, to claim them. We briefly talked about how those transactions are submitted through the wire and broadcasted to the full network. We also touched on how those transactions are picked up by the receiver and used in further transactions hence creating an ordering where outputs of previous transactions are consumed as inputs to a new transaction.