Good question in regard to the Hash Pointer; I was wondering that myself.
<<Instead of going through the cumbersome process of looking at each individual hash and seeing whether it belongs to the data or not, I can simply track it down by following the trail of hashes leading up to the data:>>
Maybe the above process of “following the trail of hashing leading up to the data” i.e. going backwards on the chain has some particular effect that isn’t covered yet.