Part 6/19:
The presentation elaborates on the process: miners repeatedly try different inputs (for example, adding a nonce—a random number—to the block header) until they find a hash that meets the difficulty criteria. Because of the probabilistic nature of hashes, brute-force computation is essential, and the energy expended ensures security: cheating miners must surpass trillions of hashing operations, translating into significant electricity costs.