Full Nodes vs. Light Clients — Trade-offs in Security and Efficiency (2 of 9)